Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Chione.exe

Overview

General Information

Sample name:Chione.exe
Analysis ID:1580959
MD5:d19b768f3d2a63120e658849b169dbe6
SHA1:4857f30e4aec8071a97716db38b6b2e374578e5f
SHA256:daf9c549f15e131cda7ff753f641328925f6f2a174a8dafb74bbc65c8cce6332
Tags:exeuser-WS77754
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Python Keylogger
AI detected suspicious sample
Found pyInstaller with non standard icon
Binary contains a suspicious time stamp
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to query CPU information (cpuid)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file does not import any functions
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Chione.exe (PID: 6872 cmdline: "C:\Users\user\Desktop\Chione.exe" MD5: D19B768F3D2A63120E658849B169DBE6)
    • Chione.exe (PID: 7084 cmdline: "C:\Users\user\Desktop\Chione.exe" MD5: D19B768F3D2A63120E658849B169DBE6)
      • cmd.exe (PID: 7144 cmdline: C:\Windows\system32\cmd.exe /c "ver" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 6184 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: Chione.exe PID: 7084JoeSecurity_PythonKeyloggerYara detected Python KeyloggerJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Chione.exeVirustotal: Detection: 23%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 83.1% probability
    Source: Chione.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
    Source: Binary string: api-ms-win-crt-locale-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1682681007.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-crt-runtime-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1683129186.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\win32api.pdb source: Chione.exe, 00000001.00000002.2932250193.00007FFE0CFA3000.00000002.00000001.01000000.0000001E.sdmp
    Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\win32api.pdb!! source: Chione.exe, 00000001.00000002.2932250193.00007FFE0CFA3000.00000002.00000001.01000000.0000001E.sdmp
    Source: Binary string: api-ms-win-core-file-l1-2-0.pdb source: Chione.exe, 00000000.00000003.1680307464.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ucrtbase.pdb source: Chione.exe, 00000001.00000002.2932135000.00007FFE01431000.00000002.00000001.01000000.00000004.sdmp
    Source: Binary string: api-ms-win-core-memory-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1680904364.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-debug-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1680040179.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC source: Chione.exe, 00000001.00000002.2930418141.00007FFDFB3B1000.00000002.00000001.01000000.00000011.sdmp
    Source: Binary string: api-ms-win-core-sysinfo-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1681840727.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-crt-filesystem-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1682453427.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\win32process.pdb source: Chione.exe, 00000001.00000002.2932726511.00007FFE0EB28000.00000002.00000001.01000000.0000001C.sdmp
    Source: Binary string: ~/.pdbrc source: Chione.exe, 00000001.00000002.2927681140.0000016A2D48C000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-crt-stdio-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1683201457.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: placed in the .pdbrc file): source: Chione.exe, 00000001.00000002.2925453016.0000016A2C853000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: Chione.exe, 00000000.00000003.1677094721.0000015738204000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2934261899.00007FFE1A471000.00000002.00000001.01000000.00000006.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_tkinter.pdb source: Chione.exe, 00000000.00000003.1679389219.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2932949233.00007FFE101D8000.00000002.00000001.01000000.00000015.sdmp
    Source: Binary string: pdb.Pdb source: Chione.exe, 00000001.00000002.2927681140.0000016A2D48C000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_multiprocessing.pdb source: Chione.exe, 00000000.00000003.1678283615.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: If a file ".pdbrc" exists in your home directory or in the current source: Chione.exe, 00000001.00000002.2925453016.0000016A2C853000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-heap-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1680574128.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdb source: Chione.exe, 00000000.00000003.1677292610.0000015738204000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2933674081.00007FFE120C5000.00000002.00000001.01000000.0000001A.sdmp
    Source: Binary string: api-ms-win-core-util-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1682013563.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-synch-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1681697469.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-crt-environment-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1682383118.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_ctypes.pdb source: Chione.exe, 00000001.00000002.2934076301.00007FFE13320000.00000002.00000001.01000000.00000008.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: Chione.exe, 00000000.00000003.1678069764.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-errorhandling-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1680133821.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PICOpenSSL 3.0.9 30 May 20233.0.9built on: Tue Jul 11 19:52:20 2023 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-3"MODULESDIR: "C:\Program Files\OpenSSL\lib\ossl-modules"CPUINFO: N/Anot availableget_and_lock..\s\crypto\ex_data.cossl_crypto_get_ex_new_index_exossl_crypto_new_ex_data_exCRYPTO_dup_ex_dataCRYPTO_set_ex_dataOPENSSL_WIN32_UTF8..\s\crypto\getenv.ccompiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC;CPUINFO: OPENSSL_ia32cap=0x%llx:0x%llxOPENSSL_ia32cap env:%sos-specificC:\Program Files\Common Files\SSLC:\Program Files\OpenSSL\lib\ossl-modules.dllCPUINFO: ..\s\crypto\init.cOPENSSL_init_cryptoOPENSSL_atexit..\s\crypto\initthread.c..\s\crypto\mem_sec.cassertion failed: (bit & 1) == 0assertion failed: list >= 0 && list < sh.freelist_sizeassertion failed: ((ptr - sh.arena) & ((sh.arena_size >> list) - 1)) == 0assertion failed: bit > 0 && bit < sh.bittable_sizeassertion failed: TESTBIT(table, bit)assertion failed: !TESTBIT(table, bit)assertion failed: WITHIN_FREELIST(list)assertion failed: WITHIN_ARENA(ptr)assertion failed: temp->next == NULL || WITHIN_ARENA(temp->next)assertion failed: (char **)temp->next->p_next == listassertion failed: WITHIN_FREELIST(temp2->p_next) || WITHIN_ARENA(temp2->p_next)assertion failed: size > 0assertion failed: (size & (size - 1)) == 0assertion failed: (minsize & (minsize - 1)) == 0assertion failed: sh.freelist != NULLassertion failed: sh.bittable != NULLassertion failed: sh.bitmalloc != NULLassertion failed: !sh_testbit(temp, slist, sh.bitmalloc)assertion failed: temp != sh.freelist[slist]assertion failed: sh.freelist[slist] == tempassertion failed: temp-(sh.arena_size >> slist) == sh_find_my_buddy(temp, slist)assertion failed: sh_testbit(chunk, list, sh.bittable)assertion failed: WITHIN_ARENA(chunk)assertion failed: sh_testbit(ptr, list, sh.bittable)assertion failed: ptr == sh_find_my_buddy(buddy, list)assertion failed: ptr != NULLassertion failed: !sh_testbit(ptr, list, sh.bitmalloc)assertion failed: sh.freelist[list] == ptr/*0123456789ABCDEFCRYPTO_memdup..\s\crypto\o_str.chexstr2buf_sepossl_hexstr2buf_sepbuf2hexstr_sepossl_buf2hexstr_sep..\s\crypto\packet.cwpacket_intern_init_lenWPACKET_start_sub_packet_len__..\s\crypto\param_build.cparam_pushparam_push_numOSSL_PARAM_BLD_push_BN_padNegative big numbers are unsupported for OSSL_PARAMOSSL_PARAM_BLD_push_utf8_stringOSSL_PARAM_BLD_push_utf8_ptrOSSL_PARAM_BLD_push_octet_stringOSSL_PARAM_BLD_push_octet_ptrOSSL_PARAM_BLD_to_param..\s\crypto\params.c source: Chione.exe, 00000001.00000002.2930418141.00007FFDFB3B1000.00000002.00000001.01000000.00000011.sdmp
    Source: Binary string: api-ms-win-core-processthreads-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1681123506.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-console-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1679733772.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-file-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1680222811.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_asyncio.pdb source: Chione.exe, 00000000.00000003.1677397423.0000015738204000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2933152060.00007FFE10307000.00000002.00000001.01000000.00000013.sdmp
    Source: Binary string: api-ms-win-crt-convert-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1682216389.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\pyexpat.pdb source: Chione.exe, 00000001.00000002.2933052132.00007FFE10252000.00000002.00000001.01000000.0000000E.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: Chione.exe, 00000000.00000003.1678173406.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2933411160.00007FFE11EBC000.00000002.00000001.01000000.0000000B.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: Chione.exe, 00000000.00000003.1677510146.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2933572202.00007FFE11EDD000.00000002.00000001.01000000.0000000A.sdmp
    Source: Binary string: api-ms-win-core-profile-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1681266768.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ucrtbase.pdbUGP source: Chione.exe, 00000001.00000002.2932135000.00007FFE01431000.00000002.00000001.01000000.00000004.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: Chione.exe, 00000000.00000003.1678511720.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2933249087.00007FFE11518000.00000002.00000001.01000000.0000000C.sdmp
    Source: Binary string: .pdbrcgOp source: Chione.exe, 00000001.00000002.2927681140.0000016A2D48C000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdbGCTL source: Chione.exe, 00000000.00000003.1677292610.0000015738204000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2933674081.00007FFE120C5000.00000002.00000001.01000000.0000001A.sdmp
    Source: Binary string: api-ms-win-crt-time-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1683376874.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-handle-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1680488964.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: Chione.exe, 00000001.00000002.2928774640.00007FFDFA960000.00000002.00000001.01000000.0000001F.sdmp
    Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\pywintypes.pdb source: Chione.exe, 00000001.00000002.2932355710.00007FFE0CFD0000.00000002.00000001.01000000.0000001B.sdmp
    Source: Binary string: api-ms-win-core-synch-l1-2-0.pdb source: Chione.exe, 00000000.00000003.1681767165.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-processenvironment-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1681053224.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\pywintypes.pdb** source: Chione.exe, 00000001.00000002.2932355710.00007FFE0CFD0000.00000002.00000001.01000000.0000001B.sdmp
    Source: Binary string: api-ms-win-core-datetime-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1679803936.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_overlapped.pdb source: Chione.exe, 00000000.00000003.1678355447.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2933774921.00007FFE12E16000.00000002.00000001.01000000.00000014.sdmp
    Source: Binary string: api-ms-win-crt-conio-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1682112694.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: Chione.exe, 00000000.00000003.1677094721.0000015738204000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2934261899.00007FFE1A471000.00000002.00000001.01000000.00000006.sdmp
    Source: Binary string: api-ms-win-crt-math-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1682980489.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-localization-l1-2-0.pdb source: Chione.exe, 00000000.00000003.1680831854.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: -c are executed after commands from .pdbrc files. source: Chione.exe, 00000001.00000002.2925453016.0000016A2C775000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-processthreads-l1-1-1.pdb source: Chione.exe, 00000000.00000003.1681193214.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\python311.pdb source: Chione.exe, 00000001.00000002.2930903704.00007FFDFB87B000.00000002.00000001.01000000.00000005.sdmp, python311.dll.0.dr
    Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: Chione.exe, 00000000.00000003.1688910803.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2933970788.00007FFE13303000.00000002.00000001.01000000.0000000D.sdmp
    Source: Binary string: api-ms-win-core-namedpipe-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1680978198.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-crt-utility-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1683450146.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-rtlsupport-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1681463711.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-timezone-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1681914266.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: Initial commands are read from .pdbrc files in your home directory source: Chione.exe, 00000001.00000002.2925453016.0000016A2C775000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-string-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1681568169.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-file-l2-1-0.pdb source: Chione.exe, 00000000.00000003.1680390123.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\libssl-3.pdbEE source: Chione.exe, 00000001.00000002.2929885479.00007FFDFAFC5000.00000002.00000001.01000000.00000012.sdmp
    Source: Binary string: .pdbrc source: Chione.exe, 00000001.00000002.2927681140.0000016A2D48C000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbNN source: Chione.exe, 00000000.00000003.1678173406.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2933411160.00007FFE11EBC000.00000002.00000001.01000000.0000000B.sdmp
    Source: Binary string: api-ms-win-crt-process-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1683055544.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-libraryloader-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1680749054.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_queue.pdb source: Chione.exe, 00000000.00000003.1678436823.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2933873264.00007FFE130C3000.00000002.00000001.01000000.0000000F.sdmp
    Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\win32gui.pdb source: Chione.exe, 00000001.00000002.2932568966.00007FFE0E16F000.00000002.00000001.01000000.00000019.sdmp
    Source: Binary string: api-ms-win-core-interlocked-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1680661196.0000015738205000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-interlocked-l1-1-0.dll.0.dr
    Source: Binary string: D:\a\1\b\bin\amd64\python3.pdb source: Chione.exe, 00000000.00000003.1687038713.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2923947733.0000016A2B580000.00000002.00000001.01000000.00000007.sdmp
    Source: Binary string: The standard debugger class (pdb.Pdb) is an example. source: Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2924522333.0000016A2BD23000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\libssl-3.pdb source: Chione.exe, 00000001.00000002.2929885479.00007FFDFAFC5000.00000002.00000001.01000000.00000012.sdmp
    Source: Binary string: api-ms-win-crt-heap-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1682523283.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-crt-string-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1683301707.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_ssl.pdb source: Chione.exe, 00000001.00000002.2932826781.00007FFE0EB4D000.00000002.00000001.01000000.00000010.sdmp
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFA7F4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF62EFA7F4C
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFA7F4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF62EFA7F4C
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFB1FE4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF62EFB1FE4
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EF98B00 FindFirstFileExW,FindClose,0_2_00007FF62EF98B00
    Source: C:\Users\user\Desktop\Chione.exeFile opened: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\Jump to behavior
    Source: C:\Users\user\Desktop\Chione.exeFile opened: C:\Users\user\AppData\Local\Temp\_MEI68722\Jump to behavior
    Source: C:\Users\user\Desktop\Chione.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
    Source: C:\Users\user\Desktop\Chione.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
    Source: C:\Users\user\Desktop\Chione.exeFile opened: C:\Users\user\AppData\Jump to behavior
    Source: C:\Users\user\Desktop\Chione.exeFile opened: C:\Users\user\Jump to behavior
    Source: Chione.exe, 00000001.00000002.2925235748.0000016A2C410000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://aka.ms/vcpython27
    Source: Chione.exe, 00000001.00000002.2927611247.0000016A2CF40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://bugs.python.org/issue23606)
    Source: Chione.exe, 00000000.00000003.1685962817.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678173406.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.co
    Source: Chione.exe, 00000000.00000003.1689282416.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: Chione.exe, 00000000.00000003.1686906330.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678069764.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679241962.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677773641.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677917738.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1684539456.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678283615.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1685962817.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1687038713.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678173406.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678511720.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1685826310.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678355447.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677397423.0000015738204000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678436823.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679389219.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1688910803.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1687637339.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677510146.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
    Source: Chione.exe, 00000000.00000003.1689282416.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: Chione.exe, 00000000.00000003.1686906330.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680133821.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682453427.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680307464.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680749054.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683055544.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678069764.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681266768.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683201457.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679803936.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683376874.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682681007.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679241962.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682383118.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681053224.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677773641.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680488964.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677917738.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1684539456.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
    Source: Chione.exe, 00000000.00000003.1686906330.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678069764.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679241962.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677773641.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677917738.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1684539456.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678283615.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1685962817.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1687038713.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678173406.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678511720.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1685826310.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678355447.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677397423.0000015738204000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678436823.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679389219.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1688910803.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1687637339.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677510146.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
    Source: Chione.exe, 00000000.00000003.1686906330.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680133821.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682453427.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680307464.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680749054.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683055544.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678069764.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681266768.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683201457.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679803936.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683376874.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682681007.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679241962.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682383118.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681053224.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677773641.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680488964.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677917738.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1684539456.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
    Source: Chione.exe, 00000001.00000002.2923968543.0000016A2B5B0000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1755423760.0000016A2B60F000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://code.activestate.com/recipes/577452-a-memoize-decorator-for-instance-methods/
    Source: Chione.exe, 00000001.00000002.2923968543.0000016A2B768000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1754990052.0000016A2BBC0000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1754990052.0000016A2BC07000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1755233383.0000016A2B768000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://code.activestate.com/recipes/577916/
    Source: Chione.exe, 00000000.00000003.1683376874.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/
    Source: Chione.exe, 00000000.00000003.1683376874.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/H
    Source: Chione.exe, 00000000.00000003.1683301707.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680133821.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682453427.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680307464.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680749054.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683055544.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681266768.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683201457.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679803936.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682681007.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682383118.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681053224.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680488964.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681123506.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681697469.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681568169.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683301707.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
    Source: Chione.exe, 00000000.00000003.1683301707.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.usertrust
    Source: Chione.exe, 00000000.00000003.1683301707.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.usertruststrtok_sucrtbase.strtok_sstrxfrmucrtbase.strxfrmtolowerucrtbase.tolowertoupperuc
    Source: Chione.exe, 00000000.00000003.1679389219.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicer
    Source: Chione.exe, 00000000.00000003.1686906330.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678069764.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679241962.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677773641.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677917738.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1684539456.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678283615.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1685962817.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1687038713.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678173406.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678511720.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1685826310.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678355447.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677397423.0000015738204000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678436823.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679389219.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1688910803.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1687637339.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677510146.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: Chione.exe, 00000000.00000003.1689282416.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: Chione.exe, 00000000.00000003.1686906330.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680133821.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682453427.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680307464.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680749054.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683055544.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678069764.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681266768.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683201457.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679803936.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683376874.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682681007.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679241962.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682383118.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681053224.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677773641.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680488964.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677917738.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1684539456.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
    Source: Chione.exe, 00000000.00000003.1686906330.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678069764.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679241962.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677773641.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677917738.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1684539456.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678283615.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1685962817.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1687038713.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678173406.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678511720.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1685826310.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678355447.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677397423.0000015738204000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678436823.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679389219.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1688910803.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1687637339.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677510146.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
    Source: Chione.exe, 00000000.00000003.1677510146.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681697469.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682216389.0000015738205000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-interlocked-l1-1-0.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
    Source: Chione.exe, 00000000.00000003.1689282416.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: Chione.exe, 00000000.00000003.1689282416.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: Chione.exe, 00000000.00000003.1686906330.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680133821.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682453427.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680307464.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680749054.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683055544.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678069764.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681266768.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683201457.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679803936.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683376874.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682681007.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679241962.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682383118.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681053224.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677773641.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680488964.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677917738.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1684539456.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
    Source: Chione.exe, 00000000.00000003.1689282416.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: Chione.exe, 00000000.00000003.1683301707.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680133821.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682453427.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680307464.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680749054.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683055544.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681266768.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683201457.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681053224.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682523283.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679803936.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683376874.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682681007.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682112694.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682383118.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681053224.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680488964.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
    Source: Chione.exe, 00000001.00000002.2925308487.0000016A2C510000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://docs.python.org/3/library/subprocess#subprocess.Popen.kill
    Source: Chione.exe, 00000001.00000002.2925308487.0000016A2C510000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://docs.python.org/3/library/subprocess#subprocess.Popen.returncode
    Source: Chione.exe, 00000001.00000002.2925235748.0000016A2C410000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://docs.python.org/3/library/subprocess#subprocess.Popen.terminate
    Source: Chione.exe, 00000001.00000002.2925018057.0000016A2C110000.00000004.00001000.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2924946352.0000016A2C000000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://docs.python.org/library/itertools.html#recipes
    Source: Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.python.org/library/unittest.html
    Source: Chione.exe, 00000001.00000002.2924946352.0000016A2C000000.00000004.00001000.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2925163119.0000016A2C310000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://foo/bar.tar.gz
    Source: Chione.exe, 00000001.00000002.2924946352.0000016A2C000000.00000004.00001000.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2925163119.0000016A2C310000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://foo/bar.tgz
    Source: Chione.exe, 00000001.00000002.2927768985.0000016A2D548000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://goo.gl/zeJZl.
    Source: Chione.exe, 00000001.00000002.2927970004.0000016A2D5F0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://mail.python.org/pipermail/python-dev/2012-June/120787.html.
    Source: Chione.exe, 00000000.00000003.1680222811.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert
    Source: Chione.exe, 00000000.00000003.1686906330.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680133821.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682453427.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680307464.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680749054.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683055544.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678069764.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681266768.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683201457.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679803936.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683376874.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682681007.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679241962.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682383118.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681053224.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677773641.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680488964.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677917738.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1684539456.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
    Source: Chione.exe, 00000000.00000003.1686906330.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680133821.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682453427.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680307464.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680749054.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683055544.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678069764.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681266768.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683201457.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679803936.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683376874.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682681007.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679241962.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682383118.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681053224.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677773641.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680488964.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677917738.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1684539456.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
    Source: Chione.exe, 00000000.00000003.1686906330.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678069764.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679241962.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677773641.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677917738.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1684539456.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678283615.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1685962817.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1687038713.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678173406.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678511720.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1685826310.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678355447.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677397423.0000015738204000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678436823.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1689282416.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679389219.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1688910803.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1687637339.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677510146.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
    Source: Chione.exe, 00000000.00000003.1689282416.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
    Source: Chione.exe, 00000000.00000003.1686906330.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678069764.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679241962.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677773641.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677917738.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1684539456.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678283615.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1685962817.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1687038713.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678173406.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678511720.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1685826310.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678355447.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677397423.0000015738204000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678436823.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679389219.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1688910803.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1687637339.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677510146.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
    Source: Chione.exe, 00000000.00000003.1683301707.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680133821.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682453427.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680307464.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680749054.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683055544.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681266768.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683201457.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681053224.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682523283.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679803936.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683376874.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682681007.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682112694.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682383118.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681053224.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680488964.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
    Source: Chione.exe, 00000001.00000002.2924874485.0000016A2BEF0000.00000004.00001000.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1753868155.0000016A2BAF8000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2924393669.0000016A2B9D0000.00000004.00001000.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1753868155.0000016A2BB08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://opensource.apple.com/source/CF/CF-744.18/CFBinaryPList.c
    Source: Chione.exe, 00000001.00000002.2924522333.0000016A2BD23000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://tip.tcl.tk/48)
    Source: Chione.exe, 00000001.00000002.2924318115.0000016A2B8D0000.00000004.00001000.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1753868155.0000016A2BB08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apple.com/DTDs/PropertyList-1.0.dtd
    Source: Chione.exe, 00000001.00000003.1753868155.0000016A2BB30000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1754005489.0000016A2B5C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.cl.cam.ac.uk/~mgk25/iso-time.html
    Source: Chione.exe, 00000000.00000003.1686906330.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680133821.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682453427.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680307464.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680749054.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683055544.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678069764.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681266768.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683201457.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679803936.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683376874.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682681007.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679241962.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682383118.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681053224.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677773641.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680488964.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1677917738.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1684539456.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
    Source: Chione.exe, 00000000.00000003.1681463711.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680978198.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683301707.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680133821.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682453427.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680307464.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680749054.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683055544.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681266768.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683201457.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681053224.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682523283.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679803936.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683376874.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682681007.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682112694.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682383118.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681053224.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.eclipse.org/0
    Source: Chione.exe, 00000001.00000003.1766021055.0000016A2BE82000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1765637145.0000016A2BE71000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2924743990.0000016A2BE59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
    Source: Chione.exe, 00000001.00000003.1753868155.0000016A2BB30000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1754005489.0000016A2B76B000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1755233383.0000016A2B768000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iana.org/time-zones/repository/tz-link.html
    Source: Chione.exe, 00000001.00000003.1753868155.0000016A2BB30000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1754005489.0000016A2B5C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm
    Source: Chione.exe, 00000001.00000002.2925453016.0000016A2C775000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://askubuntu.com/questions/697397/python3-is-not-supporting-gtk-module
    Source: Chione.exe, 00000001.00000002.2925018057.0000016A2C110000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://bugs.python.org/issue44497.
    Source: Chione.exe, 00000000.00000003.1691306040.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Connection
    Source: Chione.exe, 00000001.00000002.2927970004.0000016A2D674000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.gg/HpA7JdP3uq
    Source: Chione.exe, 00000001.00000002.2923968543.0000016A2B768000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1755233383.0000016A2B768000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
    Source: Chione.exe, 00000001.00000002.2923968543.0000016A2B5B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/multiprocessing.html
    Source: Chione.exe, 00000001.00000002.2924946352.0000016A2C000000.00000004.00001000.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2925163119.0000016A2C310000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://gist.github.com/lyssdod/f51579ae8d93c8657a5564aefc2ffbca
    Source: Chione.exe, 00000001.00000002.2923803512.0000016A2B380000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1745130687.0000016A2B38B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
    Source: Chione.exe, 00000001.00000002.2927768985.0000016A2D4A0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/asweigart/pyperclip/issues/55
    Source: Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/boppreh/keyboard
    Source: Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/boppreh/keyboard#api)
    Source: Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/boppreh/keyboard/archive/master.zip)
    Source: Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/boppreh/keyboard/issues/20)
    Source: Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/boppreh/keyboard/issues/21)
    Source: Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/boppreh/keyboard/issues/22)
    Source: Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/boppreh/mouse)
    Source: Chione.exe, 00000001.00000002.2927768985.0000016A2D548000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/giampaolo/psutil/issues/875.
    Source: Chione.exe, 00000001.00000002.2924946352.0000016A2C000000.00000004.00001000.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1755423760.0000016A2B60F000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2925163119.0000016A2C310000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/jaraco/jaraco.functools/issues/5
    Source: Chione.exe, 00000000.00000003.1688741593.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2932292153.00007FFE0CFB1000.00000002.00000001.01000000.0000001E.sdmp, Chione.exe, 00000001.00000002.2932658886.00007FFE0E182000.00000002.00000001.01000000.00000019.sdmp, Chione.exe, 00000001.00000002.2932397286.00007FFE0CFE1000.00000002.00000001.01000000.0000001B.sdmp, Chione.exe, 00000001.00000002.2932765677.00007FFE0EB2F000.00000002.00000001.01000000.0000001C.sdmpString found in binary or memory: https://github.com/mhammond/pywin32
    Source: Chione.exe, 00000001.00000002.2924946352.0000016A2C000000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/platformdirs/platformdirs
    Source: Chione.exe, 00000001.00000002.2925090756.0000016A2C210000.00000004.00001000.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2924946352.0000016A2C000000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/pypa/packaging
    Source: Chione.exe, 00000001.00000002.2925090756.0000016A2C210000.00000004.00001000.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2924946352.0000016A2C000000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/pypa/packagingEI68722
    Source: Chione.exe, 00000001.00000002.2925018057.0000016A2C110000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/pypa/setuptools/issues/1024.
    Source: Chione.exe, 00000001.00000002.2924393669.0000016A2B9D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/pypa/setuptools/issues/417#issuecomment-392298401
    Source: Chione.exe, 00000001.00000002.2925308487.0000016A2C510000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/python-pillow/Pillow/
    Source: Chione.exe, 00000001.00000002.2923586499.0000016A2B0B8000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
    Source: Chione.exe, 00000001.00000003.1745130687.0000016A2B38B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
    Source: Chione.exe, 00000001.00000002.2923803512.0000016A2B380000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1745130687.0000016A2B38B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
    Source: Chione.exe, 00000001.00000002.2923803512.0000016A2B3BB000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1750387165.0000016A2B754000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1751007002.0000016A2B754000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1750453263.0000016A2B6CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/issues/86361.
    Source: Chione.exe, 00000001.00000002.2925090756.0000016A2C210000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/importlib_metadata/issues/396
    Source: Chione.exe, 00000001.00000002.2925090756.0000016A2C210000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/importlib_metadata/issues/396d__
    Source: Chione.exe, 00000001.00000002.2923803512.0000016A2B380000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1745130687.0000016A2B38B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
    Source: Chione.exe, 00000001.00000002.2927970004.0000016A2D63C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/vs-marshall/Chione
    Source: Chione.exe, 00000001.00000002.2924946352.0000016A2C000000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://importlib-resources.readthedocs.io/en/latest/using.html#migrating-from-legacy
    Source: Chione.exe, 00000001.00000002.2924522333.0000016A2BD23000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://json.org
    Source: Chione.exe, 00000001.00000002.2927768985.0000016A2D4A0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://mouseinfo.readthedocs.io
    Source: Chione.exe, 00000001.00000002.2925163119.0000016A2C310000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://packaging.python.org/en/latest/guides/packaging-namespace-packages/.
    Source: Chione.exe, 00000001.00000002.2925163119.0000016A2C310000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://packaging.python.org/en/latest/specifications/core-metadata/
    Source: Chione.exe, 00000001.00000002.2925090756.0000016A2C210000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://packaging.python.org/en/latest/specifications/entry-points/
    Source: Chione.exe, 00000001.00000002.2925090756.0000016A2C210000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://packaging.python.org/en/latest/specifications/entry-points/_repr__
    Source: Chione.exe, 00000001.00000002.2923968543.0000016A2B5B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://packaging.python.org/en/latest/specifications/pyproject-toml/#declaring-project-metadata-the
    Source: Chione.exe, 00000001.00000002.2925018057.0000016A2C110000.00000004.00001000.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2924946352.0000016A2C000000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://packaging.python.org/specifications/entry-points/
    Source: Chione.exe, 00000001.00000002.2924318115.0000016A2B8D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://peps.python.org/pep-0205/
    Source: Chione.exe, 00000001.00000002.2930903704.00007FFDFB87B000.00000002.00000001.01000000.00000005.sdmp, python311.dll.0.drString found in binary or memory: https://peps.python.org/pep-0263/
    Source: Chione.exe, 00000001.00000002.2925235748.0000016A2C410000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://peps.python.org/pep-0685/
    Source: Chione.exe, 00000001.00000002.2925235748.0000016A2C410000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://peps.python.org/pep-0685/0
    Source: Chione.exe, 00000001.00000002.2927681140.0000016A2D390000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://pyperclip.readthedocs.io/en/latest/index.html#not-implemented-error
    Source: Chione.exe, 00000001.00000002.2925163119.0000016A2C310000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://pypi.org/project/build/).
    Source: Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pypi.python.org/pypi/keyboard/):
    Source: Chione.exe, 00000001.00000002.2924946352.0000016A2C000000.00000004.00001000.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2925163119.0000016A2C310000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://refspecs.linuxfoundation.org/elf/gabi4
    Source: Chione.exe, 00000000.00000003.1683301707.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680133821.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682453427.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680307464.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680749054.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683055544.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681266768.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683201457.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679803936.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683376874.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682681007.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682383118.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681053224.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680488964.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681123506.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681697469.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681568169.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
    Source: Chione.exe, 00000001.00000002.2925163119.0000016A2C310000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://setuptools.pypa.io/en/latest/
    Source: Chione.exe, 00000001.00000003.1752507695.0000016A2B73B000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1752152686.0000016A2BB30000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1752265609.0000016A2B73A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://setuptools.pypa.io/en/latest/pkg_resources.html
    Source: Chione.exe, 00000001.00000003.1752152686.0000016A2BB30000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1752212147.0000016A2B748000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2923968543.0000016A2B5B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://setuptools.pypa.io/en/latest/pkg_resources.html#basic-resource-access
    Source: Chione.exe, 00000001.00000002.2924393669.0000016A2B9D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://setuptools.pypa.io/en/latest/references/keywords.html#keyword-namespace-packages
    Source: Chione.exe, 00000001.00000003.1752152686.0000016A2BB30000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1752152686.0000016A2BAF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://setuptools.pypa.io/en/latest/references/keywords.html#keyword-namespace-packagesr%
    Source: Chione.exe, 00000001.00000003.1752152686.0000016A2BB30000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1752152686.0000016A2BAF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://setuptools.pypa.io/en/latest/references/keywords.html#keyword-namespace-packagesr%r&Nrlr
    Source: Chione.exe, 00000001.00000002.2927681140.0000016A2D390000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/questions/18905702/python-ctypes-and-mutable-buffers
    Source: Chione.exe, 00000001.00000002.2927768985.0000016A2D548000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/questions/4457745#4457745.
    Source: Chione.exe, 00000001.00000002.2927681140.0000016A2D390000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/questions/455434/how-should-i-use-formatmessage-properly-in-c
    Source: Chione.exe, 00000001.00000002.2925926235.0000016A2CAE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.apple.com/en-us/HT20
    Source: Chione.exe, 00000001.00000002.2925090756.0000016A2C210000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://upload.pypi.org/legacy/
    Source: Chione.exe, 00000001.00000003.1754990052.0000016A2BBC0000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1754990052.0000016A2BC07000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1756310150.0000016A2BC31000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www-cs-faculty.stanford.edu/~knuth/fasc2a.ps.gz
    Source: Chione.exe, 00000000.00000003.1689282416.0000015738205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
    Source: Chione.exe, 00000000.00000003.1685962817.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2929952449.00007FFDFB000000.00000002.00000001.01000000.00000012.sdmp, Chione.exe, 00000001.00000002.2930672008.00007FFDFB4F2000.00000002.00000001.01000000.00000011.sdmpString found in binary or memory: https://www.openssl.org/H
    Source: Chione.exe, 00000001.00000002.2923586499.0000016A2B030000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.python.org/download/releases/2.3/mro/.
    Source: Chione.exe, 00000001.00000002.2931075607.00007FFDFB918000.00000004.00000001.01000000.00000005.sdmpString found in binary or memory: https://www.python.org/psf/license/

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: Yara matchFile source: Process Memory Space: Chione.exe PID: 7084, type: MEMORYSTR
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC07B00 ClientToScreen,GetSystemMetrics,GetAsyncKeyState,GetAsyncKeyState,TrackPopupMenu,GetCursorPos,WindowFromPoint,1_2_00007FFDFAC07B00
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC0BB70 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,1_2_00007FFDFAC0BB70
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFB10380_2_00007FF62EFB1038
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFB64700_2_00007FF62EFB6470
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFB73BC0_2_00007FF62EFB73BC
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EF979600_2_00007FF62EF97960
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFA7F4C0_2_00007FF62EFA7F4C
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EF990D00_2_00007FF62EF990D0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFBA0F80_2_00007FF62EFBA0F8
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFAE11C0_2_00007FF62EFAE11C
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EF91F500_2_00007FF62EF91F50
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFA7F4C0_2_00007FF62EFA7F4C
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFA1F940_2_00007FF62EFA1F94
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFA87D00_2_00007FF62EFA87D0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFA37E00_2_00007FF62EFA37E0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFB1FE40_2_00007FF62EFB1FE4
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFB481C0_2_00007FF62EFB481C
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFA60300_2_00007FF62EFA6030
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFA2E500_2_00007FF62EFA2E50
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFB6E700_2_00007FF62EFB6E70
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFB66EC0_2_00007FF62EFB66EC
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFA1D900_2_00007FF62EFA1D90
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFA7D980_2_00007FF62EFA7D98
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFAE5B00_2_00007FF62EFAE5B0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFAA5300_2_00007FF62EFAA530
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFB43800_2_00007FF62EFB4380
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFA1B840_2_00007FF62EFA1B84
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFB10380_2_00007FF62EFB1038
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFA23A40_2_00007FF62EFA23A4
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFA3BE40_2_00007FF62EFA3BE4
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFAEC300_2_00007FF62EFAEC30
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFA19800_2_00007FF62EFA1980
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFA21A00_2_00007FF62EFA21A0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFA8518A01_2_00007FFDFA8518A0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC053801_2_00007FFDFAC05380
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFACC91F01_2_00007FFDFACC91F0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC014701_2_00007FFDFAC01470
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFACC75AE1_2_00007FFDFACC75AE
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC043401_2_00007FFDFAC04340
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC240601_2_00007FFDFAC24060
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC707401_2_00007FFDFAC70740
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFACD85701_2_00007FFDFACD8570
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC05B201_2_00007FFDFAC05B20
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFACEBA601_2_00007FFDFACEBA60
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFACADC401_2_00007FFDFACADC40
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC9DBF01_2_00007FFDFAC9DBF0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC6BBE01_2_00007FFDFAC6BBE0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC75BB01_2_00007FFDFAC75BB0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC99BB01_2_00007FFDFAC99BB0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC71BD01_2_00007FFDFAC71BD0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC7B8801_2_00007FFDFAC7B880
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFABFD9A01_2_00007FFDFABFD9A0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC179C01_2_00007FFDFAC179C0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC7FEE01_2_00007FFDFAC7FEE0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC33EB01_2_00007FFDFAC33EB0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFACDDED01_2_00007FFDFACDDED0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC73E601_2_00007FFDFAC73E60
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC55E901_2_00007FFDFAC55E90
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC39E801_2_00007FFDFAC39E80
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC6BD301_2_00007FFDFAC6BD30
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFABF3D201_2_00007FFDFABF3D20
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC65D501_2_00007FFDFAC65D50
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFABFDD001_2_00007FFDFABFDD00
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFACD7D101_2_00007FFDFACD7D10
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC77CA01_2_00007FFDFAC77CA0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC69C601_2_00007FFDFAC69C60
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFACAFE101_2_00007FFDFACAFE10
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFACDBDD01_2_00007FFDFACDBDD0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFACCF3001_2_00007FFDFACCF300
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAD96B401_2_00007FFDFAD96B40
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAE262701_2_00007FFDFAE26270
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAD84C271_2_00007FFDFAD84C27
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAED9E901_2_00007FFDFAED9E90
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFADE25101_2_00007FFDFADE2510
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAE6CDF01_2_00007FFDFAE6CDF0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAE9BB501_2_00007FFDFAE9BB50
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAE96B201_2_00007FFDFAE96B20
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFADC63001_2_00007FFDFADC6300
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFADE33101_2_00007FFDFADE3310
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAE9F2E01_2_00007FFDFAE9F2E0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAE2B2C01_2_00007FFDFAE2B2C0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAE9C2B01_2_00007FFDFAE9C2B0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAE6AAA01_2_00007FFDFAE6AAA0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAE48AA01_2_00007FFDFAE48AA0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAE002801_2_00007FFDFAE00280
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAD85C211_2_00007FFDFAD85C21
    Source: C:\Users\user\Desktop\Chione.exeCode function: String function: 00007FFDFAE68BD0 appears 256 times
    Source: C:\Users\user\Desktop\Chione.exeCode function: String function: 00007FF62EF92B30 appears 47 times
    Source: unicodedata.pyd.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
    Source: _overlapped.pyd.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
    Source: api-ms-win-core-processenvironment-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-interlocked-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-util-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-crt-stdio-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-processthreads-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-errorhandling-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-console-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-crt-process-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-synch-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-timezone-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-file-l2-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-debug-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-string-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-handle-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-synch-l1-2-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-profile-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-localization-l1-2-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-datetime-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-crt-math-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-crt-locale-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-crt-time-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-processthreads-l1-1-1.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-crt-utility-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-namedpipe-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-crt-filesystem-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-file-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-rtlsupport-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-crt-conio-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-crt-heap-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-crt-convert-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-crt-runtime-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-crt-string-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-file-l1-2-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-memory-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-sysinfo-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-libraryloader-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: python3.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-core-heap-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-crt-environment-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
    Source: Chione.exe, 00000000.00000003.1686906330.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamepyexpat.pyd. vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1680133821.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1682453427.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1680307464.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1680749054.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1683055544.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1678069764.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_hashlib.pyd. vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1681266768.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1680222811.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1683201457.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1679803936.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1683376874.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1682681007.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1679241962.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_ssl.pyd. vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1682383118.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1681053224.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1677773641.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_ctypes.pyd. vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1680488964.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1683129186.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1677917738.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_decimal.pyd. vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1678283615.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_multiprocessing.pyd. vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1681568169.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1683301707.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1681914266.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1681193214.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1685962817.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelibsslH vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1677094721.0000015738204000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1687038713.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamepython3.dll. vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1678173406.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_lzma.pyd. vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1678511720.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_socket.pyd. vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1680040179.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1688741593.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamepywintypes311.dll0 vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1678355447.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_overlapped.pyd. vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1680904364.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1679733772.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1677397423.0000015738204000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_asyncio.pyd. vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1681123506.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1682523283.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1682980489.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1681840727.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1683450146.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1677292610.0000015738204000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140_1.dllT vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1678436823.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_queue.pyd. vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1689282416.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenametcl86.dllP vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1679389219.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_tkinter.pyd. vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1680574128.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1682112694.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1688910803.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameselect.pyd. vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1680661196.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1680978198.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1680831854.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1682013563.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1681463711.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1681767165.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1680390123.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1677510146.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_bz2.pyd. vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1681697469.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exe, 00000000.00000003.1682216389.0000015738205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs Chione.exe
    Source: Chione.exeBinary or memory string: OriginalFilename vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2932987100.00007FFE101DE000.00000002.00000001.01000000.00000015.sdmpBinary or memory string: OriginalFilename_tkinter.pyd. vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2923947733.0000016A2B580000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: OriginalFilenamepython3.dll. vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2934301595.00007FFE1A477000.00000002.00000001.01000000.00000006.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2932292153.00007FFE0CFB1000.00000002.00000001.01000000.0000001E.sdmpBinary or memory string: OriginalFilenamewin32api.pyd0 vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2933287901.00007FFE11522000.00000002.00000001.01000000.0000000C.sdmpBinary or memory string: OriginalFilename_socket.pyd. vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2933715888.00007FFE120C9000.00000002.00000001.01000000.0000001A.sdmpBinary or memory string: OriginalFilenamevcruntime140_1.dllT vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2932658886.00007FFE0E182000.00000002.00000001.01000000.00000019.sdmpBinary or memory string: OriginalFilenamewin32gui.pyd0 vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2934008192.00007FFE13306000.00000002.00000001.01000000.0000000D.sdmpBinary or memory string: OriginalFilenameselect.pyd. vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2929952449.00007FFDFB000000.00000002.00000001.01000000.00000012.sdmpBinary or memory string: OriginalFilenamelibsslH vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2930672008.00007FFDFB4F2000.00000002.00000001.01000000.00000011.sdmpBinary or memory string: OriginalFilenamelibcryptoH vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpBinary or memory string: OriginalFilenametk86.dllP vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2932186625.00007FFE0146C000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenameucrtbase.dllj% vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2933509615.00007FFE11EC5000.00000002.00000001.01000000.0000000B.sdmpBinary or memory string: OriginalFilename_lzma.pyd. vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2932397286.00007FFE0CFE1000.00000002.00000001.01000000.0000001B.sdmpBinary or memory string: OriginalFilenamepywintypes311.dll0 vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2932765677.00007FFE0EB2F000.00000002.00000001.01000000.0000001C.sdmpBinary or memory string: OriginalFilenamewin32process.pyd0 vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpBinary or memory string: OriginalFilenametcl86.dllP vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2933612287.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpBinary or memory string: OriginalFilename_bz2.pyd. vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2932034816.00007FFDFBAB7000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenamepython311.dll. vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2933190263.00007FFE1030E000.00000002.00000001.01000000.00000013.sdmpBinary or memory string: OriginalFilename_asyncio.pyd. vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2933911887.00007FFE130C6000.00000002.00000001.01000000.0000000F.sdmpBinary or memory string: OriginalFilename_queue.pyd. vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2933814845.00007FFE12E1B000.00000002.00000001.01000000.00000014.sdmpBinary or memory string: OriginalFilename_overlapped.pyd. vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2933092560.00007FFE1025E000.00000002.00000001.01000000.0000000E.sdmpBinary or memory string: OriginalFilenamepyexpat.pyd. vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2934119269.00007FFE1332B000.00000002.00000001.01000000.00000008.sdmpBinary or memory string: OriginalFilename_ctypes.pyd. vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2928970621.00007FFDFA965000.00000002.00000001.01000000.0000001F.sdmpBinary or memory string: OriginalFilenameunicodedata.pyd. vs Chione.exe
    Source: Chione.exe, 00000001.00000002.2932891812.00007FFE0EB69000.00000002.00000001.01000000.00000010.sdmpBinary or memory string: OriginalFilename_ssl.pyd. vs Chione.exe
    Source: classification engineClassification label: mal64.spyw.winEXE@6/1004@0/0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EF98570 GetLastError,FormatMessageW,WideCharToMultiByte,0_2_00007FF62EF98570
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFABF7D20 GetModuleHandleW,FindResourceW,LoadResource,LockResource,memcpy,1_2_00007FFDFABF7D20
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6184:120:WilError_03
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722Jump to behavior
    Source: Chione.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\Chione.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: Chione.exeVirustotal: Detection: 23%
    Source: Chione.exeString found in binary or memory: -startline must be less than or equal to -endline
    Source: Chione.exeString found in binary or memory: -help
    Source: C:\Users\user\Desktop\Chione.exeFile read: C:\Users\user\Desktop\Chione.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\Chione.exe "C:\Users\user\Desktop\Chione.exe"
    Source: C:\Users\user\Desktop\Chione.exeProcess created: C:\Users\user\Desktop\Chione.exe "C:\Users\user\Desktop\Chione.exe"
    Source: C:\Users\user\Desktop\Chione.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "ver"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\Chione.exeProcess created: C:\Users\user\Desktop\Chione.exe "C:\Users\user\Desktop\Chione.exe"Jump to behavior
    Source: C:\Users\user\Desktop\Chione.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "ver"Jump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: libffi-8.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: libcrypto-3.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: libssl-3.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: tcl86t.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: tk86t.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: logoncli.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: pywintypes311.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: vcruntime140_1.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: pdh.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: iconcodecservice.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: windowscodecs.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeSection loaded: textshaping.dllJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Users\user\Desktop\Chione.exeWindow detected: Number of UI elements: 14
    Source: Chione.exeStatic PE information: Image base 0x140000000 > 0x60000000
    Source: Chione.exeStatic file information: File size 18662191 > 1048576
    Source: Chione.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: Chione.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: Chione.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: Chione.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Chione.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: Chione.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: Chione.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
    Source: Chione.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: api-ms-win-crt-locale-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1682681007.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-crt-runtime-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1683129186.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\win32api.pdb source: Chione.exe, 00000001.00000002.2932250193.00007FFE0CFA3000.00000002.00000001.01000000.0000001E.sdmp
    Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\win32api.pdb!! source: Chione.exe, 00000001.00000002.2932250193.00007FFE0CFA3000.00000002.00000001.01000000.0000001E.sdmp
    Source: Binary string: api-ms-win-core-file-l1-2-0.pdb source: Chione.exe, 00000000.00000003.1680307464.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ucrtbase.pdb source: Chione.exe, 00000001.00000002.2932135000.00007FFE01431000.00000002.00000001.01000000.00000004.sdmp
    Source: Binary string: api-ms-win-core-memory-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1680904364.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-debug-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1680040179.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC source: Chione.exe, 00000001.00000002.2930418141.00007FFDFB3B1000.00000002.00000001.01000000.00000011.sdmp
    Source: Binary string: api-ms-win-core-sysinfo-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1681840727.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-crt-filesystem-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1682453427.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\win32process.pdb source: Chione.exe, 00000001.00000002.2932726511.00007FFE0EB28000.00000002.00000001.01000000.0000001C.sdmp
    Source: Binary string: ~/.pdbrc source: Chione.exe, 00000001.00000002.2927681140.0000016A2D48C000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-crt-stdio-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1683201457.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: placed in the .pdbrc file): source: Chione.exe, 00000001.00000002.2925453016.0000016A2C853000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: Chione.exe, 00000000.00000003.1677094721.0000015738204000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2934261899.00007FFE1A471000.00000002.00000001.01000000.00000006.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_tkinter.pdb source: Chione.exe, 00000000.00000003.1679389219.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2932949233.00007FFE101D8000.00000002.00000001.01000000.00000015.sdmp
    Source: Binary string: pdb.Pdb source: Chione.exe, 00000001.00000002.2927681140.0000016A2D48C000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_multiprocessing.pdb source: Chione.exe, 00000000.00000003.1678283615.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: If a file ".pdbrc" exists in your home directory or in the current source: Chione.exe, 00000001.00000002.2925453016.0000016A2C853000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-heap-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1680574128.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdb source: Chione.exe, 00000000.00000003.1677292610.0000015738204000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2933674081.00007FFE120C5000.00000002.00000001.01000000.0000001A.sdmp
    Source: Binary string: api-ms-win-core-util-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1682013563.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-synch-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1681697469.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-crt-environment-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1682383118.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_ctypes.pdb source: Chione.exe, 00000001.00000002.2934076301.00007FFE13320000.00000002.00000001.01000000.00000008.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: Chione.exe, 00000000.00000003.1678069764.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-errorhandling-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1680133821.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PICOpenSSL 3.0.9 30 May 20233.0.9built on: Tue Jul 11 19:52:20 2023 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-3"MODULESDIR: "C:\Program Files\OpenSSL\lib\ossl-modules"CPUINFO: N/Anot availableget_and_lock..\s\crypto\ex_data.cossl_crypto_get_ex_new_index_exossl_crypto_new_ex_data_exCRYPTO_dup_ex_dataCRYPTO_set_ex_dataOPENSSL_WIN32_UTF8..\s\crypto\getenv.ccompiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC;CPUINFO: OPENSSL_ia32cap=0x%llx:0x%llxOPENSSL_ia32cap env:%sos-specificC:\Program Files\Common Files\SSLC:\Program Files\OpenSSL\lib\ossl-modules.dllCPUINFO: ..\s\crypto\init.cOPENSSL_init_cryptoOPENSSL_atexit..\s\crypto\initthread.c..\s\crypto\mem_sec.cassertion failed: (bit & 1) == 0assertion failed: list >= 0 && list < sh.freelist_sizeassertion failed: ((ptr - sh.arena) & ((sh.arena_size >> list) - 1)) == 0assertion failed: bit > 0 && bit < sh.bittable_sizeassertion failed: TESTBIT(table, bit)assertion failed: !TESTBIT(table, bit)assertion failed: WITHIN_FREELIST(list)assertion failed: WITHIN_ARENA(ptr)assertion failed: temp->next == NULL || WITHIN_ARENA(temp->next)assertion failed: (char **)temp->next->p_next == listassertion failed: WITHIN_FREELIST(temp2->p_next) || WITHIN_ARENA(temp2->p_next)assertion failed: size > 0assertion failed: (size & (size - 1)) == 0assertion failed: (minsize & (minsize - 1)) == 0assertion failed: sh.freelist != NULLassertion failed: sh.bittable != NULLassertion failed: sh.bitmalloc != NULLassertion failed: !sh_testbit(temp, slist, sh.bitmalloc)assertion failed: temp != sh.freelist[slist]assertion failed: sh.freelist[slist] == tempassertion failed: temp-(sh.arena_size >> slist) == sh_find_my_buddy(temp, slist)assertion failed: sh_testbit(chunk, list, sh.bittable)assertion failed: WITHIN_ARENA(chunk)assertion failed: sh_testbit(ptr, list, sh.bittable)assertion failed: ptr == sh_find_my_buddy(buddy, list)assertion failed: ptr != NULLassertion failed: !sh_testbit(ptr, list, sh.bitmalloc)assertion failed: sh.freelist[list] == ptr/*0123456789ABCDEFCRYPTO_memdup..\s\crypto\o_str.chexstr2buf_sepossl_hexstr2buf_sepbuf2hexstr_sepossl_buf2hexstr_sep..\s\crypto\packet.cwpacket_intern_init_lenWPACKET_start_sub_packet_len__..\s\crypto\param_build.cparam_pushparam_push_numOSSL_PARAM_BLD_push_BN_padNegative big numbers are unsupported for OSSL_PARAMOSSL_PARAM_BLD_push_utf8_stringOSSL_PARAM_BLD_push_utf8_ptrOSSL_PARAM_BLD_push_octet_stringOSSL_PARAM_BLD_push_octet_ptrOSSL_PARAM_BLD_to_param..\s\crypto\params.c source: Chione.exe, 00000001.00000002.2930418141.00007FFDFB3B1000.00000002.00000001.01000000.00000011.sdmp
    Source: Binary string: api-ms-win-core-processthreads-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1681123506.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-console-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1679733772.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-file-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1680222811.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_asyncio.pdb source: Chione.exe, 00000000.00000003.1677397423.0000015738204000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2933152060.00007FFE10307000.00000002.00000001.01000000.00000013.sdmp
    Source: Binary string: api-ms-win-crt-convert-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1682216389.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\pyexpat.pdb source: Chione.exe, 00000001.00000002.2933052132.00007FFE10252000.00000002.00000001.01000000.0000000E.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: Chione.exe, 00000000.00000003.1678173406.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2933411160.00007FFE11EBC000.00000002.00000001.01000000.0000000B.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: Chione.exe, 00000000.00000003.1677510146.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2933572202.00007FFE11EDD000.00000002.00000001.01000000.0000000A.sdmp
    Source: Binary string: api-ms-win-core-profile-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1681266768.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ucrtbase.pdbUGP source: Chione.exe, 00000001.00000002.2932135000.00007FFE01431000.00000002.00000001.01000000.00000004.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: Chione.exe, 00000000.00000003.1678511720.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2933249087.00007FFE11518000.00000002.00000001.01000000.0000000C.sdmp
    Source: Binary string: .pdbrcgOp source: Chione.exe, 00000001.00000002.2927681140.0000016A2D48C000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdbGCTL source: Chione.exe, 00000000.00000003.1677292610.0000015738204000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2933674081.00007FFE120C5000.00000002.00000001.01000000.0000001A.sdmp
    Source: Binary string: api-ms-win-crt-time-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1683376874.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-handle-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1680488964.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: Chione.exe, 00000001.00000002.2928774640.00007FFDFA960000.00000002.00000001.01000000.0000001F.sdmp
    Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\pywintypes.pdb source: Chione.exe, 00000001.00000002.2932355710.00007FFE0CFD0000.00000002.00000001.01000000.0000001B.sdmp
    Source: Binary string: api-ms-win-core-synch-l1-2-0.pdb source: Chione.exe, 00000000.00000003.1681767165.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-processenvironment-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1681053224.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\pywintypes.pdb** source: Chione.exe, 00000001.00000002.2932355710.00007FFE0CFD0000.00000002.00000001.01000000.0000001B.sdmp
    Source: Binary string: api-ms-win-core-datetime-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1679803936.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_overlapped.pdb source: Chione.exe, 00000000.00000003.1678355447.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2933774921.00007FFE12E16000.00000002.00000001.01000000.00000014.sdmp
    Source: Binary string: api-ms-win-crt-conio-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1682112694.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: Chione.exe, 00000000.00000003.1677094721.0000015738204000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2934261899.00007FFE1A471000.00000002.00000001.01000000.00000006.sdmp
    Source: Binary string: api-ms-win-crt-math-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1682980489.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-localization-l1-2-0.pdb source: Chione.exe, 00000000.00000003.1680831854.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: -c are executed after commands from .pdbrc files. source: Chione.exe, 00000001.00000002.2925453016.0000016A2C775000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-processthreads-l1-1-1.pdb source: Chione.exe, 00000000.00000003.1681193214.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\python311.pdb source: Chione.exe, 00000001.00000002.2930903704.00007FFDFB87B000.00000002.00000001.01000000.00000005.sdmp, python311.dll.0.dr
    Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: Chione.exe, 00000000.00000003.1688910803.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2933970788.00007FFE13303000.00000002.00000001.01000000.0000000D.sdmp
    Source: Binary string: api-ms-win-core-namedpipe-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1680978198.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-crt-utility-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1683450146.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-rtlsupport-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1681463711.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-timezone-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1681914266.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: Initial commands are read from .pdbrc files in your home directory source: Chione.exe, 00000001.00000002.2925453016.0000016A2C775000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-string-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1681568169.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-file-l2-1-0.pdb source: Chione.exe, 00000000.00000003.1680390123.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\libssl-3.pdbEE source: Chione.exe, 00000001.00000002.2929885479.00007FFDFAFC5000.00000002.00000001.01000000.00000012.sdmp
    Source: Binary string: .pdbrc source: Chione.exe, 00000001.00000002.2927681140.0000016A2D48C000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbNN source: Chione.exe, 00000000.00000003.1678173406.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2933411160.00007FFE11EBC000.00000002.00000001.01000000.0000000B.sdmp
    Source: Binary string: api-ms-win-crt-process-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1683055544.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-core-libraryloader-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1680749054.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_queue.pdb source: Chione.exe, 00000000.00000003.1678436823.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2933873264.00007FFE130C3000.00000002.00000001.01000000.0000000F.sdmp
    Source: Binary string: C:\src\pywin32\build\temp.win-amd64-cpython-311\Release\win32gui.pdb source: Chione.exe, 00000001.00000002.2932568966.00007FFE0E16F000.00000002.00000001.01000000.00000019.sdmp
    Source: Binary string: api-ms-win-core-interlocked-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1680661196.0000015738205000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-interlocked-l1-1-0.dll.0.dr
    Source: Binary string: D:\a\1\b\bin\amd64\python3.pdb source: Chione.exe, 00000000.00000003.1687038713.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2923947733.0000016A2B580000.00000002.00000001.01000000.00000007.sdmp
    Source: Binary string: The standard debugger class (pdb.Pdb) is an example. source: Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2924522333.0000016A2BD23000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\libssl-3.pdb source: Chione.exe, 00000001.00000002.2929885479.00007FFDFAFC5000.00000002.00000001.01000000.00000012.sdmp
    Source: Binary string: api-ms-win-crt-heap-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1682523283.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: api-ms-win-crt-string-l1-1-0.pdb source: Chione.exe, 00000000.00000003.1683301707.0000015738205000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\a\1\b\bin\amd64\_ssl.pdb source: Chione.exe, 00000001.00000002.2932826781.00007FFE0EB4D000.00000002.00000001.01000000.00000010.sdmp
    Source: Chione.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: Chione.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: Chione.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: Chione.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: Chione.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
    Source: VCRUNTIME140.dll.0.drStatic PE information: 0xC94BF788 [Wed Jan 6 22:49:44 2077 UTC]
    Source: Chione.exeStatic PE information: section name: _RDATA
    Source: VCRUNTIME140.dll.0.drStatic PE information: section name: _RDATA
    Source: libcrypto-3.dll.0.drStatic PE information: section name: .00cfg
    Source: libssl-3.dll.0.drStatic PE information: section name: .00cfg
    Source: python311.dll.0.drStatic PE information: section name: PyRuntim
    Source: _imagingft.cp311-win_amd64.pyd.0.drStatic PE information: section name: _RDATA
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFD506C push rcx; iretd 0_2_00007FF62EFD506D
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFA974AEE push 6FFDC5D5h; iretd 1_2_00007FFDFA974AF4
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFA9776D3 push 6FFDC5D5h; iretd 1_2_00007FFDFA9776D9
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFA974FEA push 6FFDC5C3h; iretd 1_2_00007FFDFA974FF0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFA974640 push 60F5C5F1h; iretd 1_2_00007FFDFA974648
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFA977425 push 60F5C5F1h; iretd 1_2_00007FFDFA97742D
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFA977983 push 6FFDC5CAh; ret 1_2_00007FFDFA977989
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFA9779CF push 6FFDC5C3h; iretd 1_2_00007FFDFA9779D5
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFA974F9E push 6FFDC5CAh; ret 1_2_00007FFDFA974FA4

    Persistence and Installation Behavior

    barindex
    Source: C:\Users\user\Desktop\Chione.exeProcess created: "C:\Users\user\Desktop\Chione.exe"
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-file-l1-2-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\PIL\_imagingft.cp311-win_amd64.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\libffi-8.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\VCRUNTIME140.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\psutil\_psutil_windows.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\_cffi_backend.cp311-win_amd64.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\_queue.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\ucrtbase.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\_asyncio.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\python311.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-processthreads-l1-1-1.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\libcrypto-3.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\win32\win32gui.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\PIL\_imagingmath.cp311-win_amd64.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\_bz2.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\_tkinter.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\_hashlib.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-errorhandling-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\_ssl.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\unicodedata.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\_ctypes.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-file-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-string-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl86t.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-process-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\PIL\_imagingcms.cp311-win_amd64.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-utility-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\tk86t.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\win32\win32process.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\python3.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\win32\win32api.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\pywin32_system32\pywintypes311.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\VCRUNTIME140_1.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\PIL\_imagingtk.cp311-win_amd64.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-synch-l1-2-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\PIL\_imaging.cp311-win_amd64.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-util-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\select.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\_overlapped.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-timezone-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\_lzma.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-console-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\PIL\_webp.cp311-win_amd64.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\_multiprocessing.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\pyexpat.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\_socket.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\_decimal.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-file-l2-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\libssl-3.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-time-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAC14370 IsIconic,IsZoomed,AdjustWindowRectEx,SendMessageW,SendMessageW,GetSystemMetrics,MoveWindow,GetWindowRect,GetClientRect,MoveWindow,GetWindowRect,MoveWindow,DrawMenuBar,1_2_00007FFDFAC14370
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EF96F00 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00007FF62EF96F00
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-file-l1-2-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\PIL\_imagingft.cp311-win_amd64.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\psutil\_psutil_windows.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\_cffi_backend.cp311-win_amd64.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\_queue.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\_asyncio.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\python311.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-processthreads-l1-1-1.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\win32\win32gui.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\_bz2.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\PIL\_imagingmath.cp311-win_amd64.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\_tkinter.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\_hashlib.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-errorhandling-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\_ssl.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\_ctypes.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\unicodedata.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-file-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-string-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-process-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\PIL\_imagingcms.cp311-win_amd64.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-utility-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\python3.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\win32\win32process.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\win32\win32api.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\PIL\_imagingtk.cp311-win_amd64.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-synch-l1-2-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\PIL\_imaging.cp311-win_amd64.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-util-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\select.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\_overlapped.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-timezone-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\_lzma.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-console-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\_multiprocessing.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\PIL\_webp.cp311-win_amd64.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\pyexpat.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\_socket.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\_decimal.pydJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-file-l2-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-time-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Chione.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-16981
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFA7F4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF62EFA7F4C
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFA7F4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF62EFA7F4C
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFB1FE4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF62EFB1FE4
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EF98B00 FindFirstFileExW,FindClose,0_2_00007FF62EF98B00
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAECBF30 GetModuleHandleW,GetProcAddress,GetVersionExW,GetSystemInfo,wsprintfA,memmove,1_2_00007FFDFAECBF30
    Source: C:\Users\user\Desktop\Chione.exeFile opened: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\Jump to behavior
    Source: C:\Users\user\Desktop\Chione.exeFile opened: C:\Users\user\AppData\Local\Temp\_MEI68722\Jump to behavior
    Source: C:\Users\user\Desktop\Chione.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
    Source: C:\Users\user\Desktop\Chione.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
    Source: C:\Users\user\Desktop\Chione.exeFile opened: C:\Users\user\AppData\Jump to behavior
    Source: C:\Users\user\Desktop\Chione.exeFile opened: C:\Users\user\Jump to behavior
    Source: Chione.exe, 00000001.00000003.1752265609.0000016A2B6BA000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1753348220.0000016A2B6BA000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2923968543.0000016A2B5B0000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1754005489.0000016A2B6B7000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1755423760.0000016A2B6B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWj
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EF9C67C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF62EF9C67C
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFB3BF0 GetProcessHeap,0_2_00007FF62EFB3BF0
    Source: C:\Users\user\Desktop\Chione.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EF9C860 SetUnhandledExceptionFilter,0_2_00007FF62EF9C860
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EF9C67C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF62EF9C67C
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EF9BDE0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF62EF9BDE0
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFAACD8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF62EFAACD8
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFA853058 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FFDFA853058
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFA852A90 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FFDFA852A90
    Source: C:\Users\user\Desktop\Chione.exeProcess created: C:\Users\user\Desktop\Chione.exe "C:\Users\user\Desktop\Chione.exe"Jump to behavior
    Source: C:\Users\user\Desktop\Chione.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "ver"Jump to behavior
    Source: Chione.exe, 00000001.00000002.2925453016.0000016A2C99B000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2925453016.0000016A2C95B000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2927970004.0000016A2D674000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: DOF_PROGMAN
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFB9F40 cpuid 0_2_00007FF62EFB9F40
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\PIL VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\PIL VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\PIL VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\PIL VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\PIL VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl8 VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl8\8.4 VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl8 VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl8\8.5 VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\encoding VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\http1.0 VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\msgs VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\opt0.4 VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\Africa VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\Africa VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\Africa VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\Africa VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\Africa VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\Africa VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\Africa VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\Africa VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\Africa VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\Africa VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\Africa VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\Africa VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\Africa VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\Africa VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\Africa VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\Africa VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\Africa VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\Africa VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\Africa VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\Africa VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\Africa VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America\Argentina VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America\Argentina VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America\Argentina VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America\Argentina VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America\Argentina VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America\Argentina VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America\Argentina VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America\Argentina VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America\Argentina VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America\Argentina VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl\tzdata\America VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\tcl VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\ucrtbase.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\Desktop\Chione.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\Desktop\Chione.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722 VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722 VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722 VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722 VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\_ctypes.pyd VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\Desktop\Chione.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\Desktop\Chione.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\Desktop\Chione.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\Desktop\Chione.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722 VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\Desktop\Chione.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\Desktop\Chione.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722 VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\_bz2.pyd VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\Desktop\Chione.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722 VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\_lzma.pyd VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\Desktop\Chione.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\Desktop\Chione.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\Desktop\Chione.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\base_library.zip VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\Desktop\Chione.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722 VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI68722\win32 VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EF9C560 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF62EF9C560
    Source: C:\Users\user\Desktop\Chione.exeCode function: 0_2_00007FF62EFB6470 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,0_2_00007FF62EFB6470
    Source: C:\Users\user\Desktop\Chione.exeCode function: 1_2_00007FFDFAECBF30 GetModuleHandleW,GetProcAddress,GetVersionExW,GetSystemInfo,wsprintfA,memmove,1_2_00007FFDFAECBF30
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    12
    Process Injection
    12
    Process Injection
    21
    Input Capture
    2
    System Time Discovery
    Remote Services21
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts1
    Native API
    Boot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    LSASS Memory21
    Security Software Discovery
    Remote Desktop Protocol1
    Archive Collected Data
    Junk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
    Obfuscated Files or Information
    Security Account Manager1
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Timestomp
    NTDS1
    Application Window Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA Secrets2
    File and Directory Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials24
    System Information Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1580959 Sample: Chione.exe Startdate: 26/12/2024 Architecture: WINDOWS Score: 64 26 Multi AV Scanner detection for submitted file 2->26 28 Yara detected Python Keylogger 2->28 30 AI detected suspicious sample 2->30 8 Chione.exe 1001 2->8         started        process3 file4 18 C:\Users\user\AppData\...\win32process.pyd, PE32+ 8->18 dropped 20 C:\Users\user\AppData\Local\...\win32gui.pyd, PE32+ 8->20 dropped 22 C:\Users\user\AppData\Local\...\win32api.pyd, PE32+ 8->22 dropped 24 72 other files (none is malicious) 8->24 dropped 32 Found pyInstaller with non standard icon 8->32 12 Chione.exe 8->12         started        signatures5 process6 process7 14 cmd.exe 1 12->14         started        process8 16 conhost.exe 14->16         started       

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Chione.exe24%VirustotalBrowse
    Chione.exe11%ReversingLabsWin32.Trojan.Generic
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\_MEI68722\PIL\_imaging.cp311-win_amd64.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\PIL\_imagingcms.cp311-win_amd64.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\PIL\_imagingft.cp311-win_amd64.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\PIL\_imagingmath.cp311-win_amd64.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\PIL\_imagingtk.cp311-win_amd64.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\PIL\_webp.cp311-win_amd64.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\VCRUNTIME140.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\VCRUNTIME140_1.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\_asyncio.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\_bz2.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\_cffi_backend.cp311-win_amd64.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\_ctypes.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\_decimal.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\_hashlib.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\_lzma.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\_multiprocessing.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\_overlapped.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\_queue.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\_socket.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\_ssl.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\_tkinter.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-console-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-datetime-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-debug-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-errorhandling-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-file-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-file-l1-2-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-file-l2-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-handle-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-heap-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-interlocked-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-libraryloader-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-localization-l1-2-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-memory-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-namedpipe-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-processenvironment-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-processthreads-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-processthreads-l1-1-1.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-profile-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-rtlsupport-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-string-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-synch-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-synch-l1-2-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-sysinfo-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-timezone-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-core-util-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-conio-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-convert-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-environment-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-filesystem-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-heap-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-locale-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-math-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-process-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-runtime-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-stdio-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-string-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-time-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\api-ms-win-crt-utility-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\libcrypto-3.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\libffi-8.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\libssl-3.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\psutil\_psutil_windows.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\pyexpat.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\python3.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\python311.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\pywin32_system32\pywintypes311.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI68722\select.pyd0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://crl.usertruststrtok_sucrtbase.strtok_sstrxfrmucrtbase.strxfrmtolowerucrtbase.tolowertoupperuc0%Avira URL Cloudsafe
    https://setuptools.pypa.io/en/latest/0%Avira URL Cloudsafe
    http://ocsp.digicert0%Avira URL Cloudsafe
    https://setuptools.pypa.io/en/latest/references/keywords.html#keyword-namespace-packagesr%0%Avira URL Cloudsafe
    https://peps.python.org/pep-0685/0%Avira URL Cloudsafe
    https://peps.python.org/pep-0685/00%Avira URL Cloudsafe
    http://crl.usertrust0%Avira URL Cloudsafe
    https://setuptools.pypa.io/en/latest/pkg_resources.html0%Avira URL Cloudsafe
    https://setuptools.pypa.io/en/latest/references/keywords.html#keyword-namespace-packagesr%r&Nrlr0%Avira URL Cloudsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    https://github.com/asweigart/pyperclip/issues/55Chione.exe, 00000001.00000002.2927768985.0000016A2D4A0000.00000004.00001000.00020000.00000000.sdmpfalse
      high
      http://ocsp.sectigo.com0Chione.exe, 00000000.00000003.1683301707.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680133821.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682453427.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680307464.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680749054.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683055544.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681266768.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683201457.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681053224.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682523283.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679803936.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683376874.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682681007.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682112694.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682383118.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681053224.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680488964.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738205000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        https://github.com/giampaolo/psutil/issues/875.Chione.exe, 00000001.00000002.2927768985.0000016A2D548000.00000004.00001000.00020000.00000000.sdmpfalse
          high
          https://setuptools.pypa.io/en/latest/references/keywords.html#keyword-namespace-packagesChione.exe, 00000001.00000002.2924393669.0000016A2B9D0000.00000004.00001000.00020000.00000000.sdmpfalse
            high
            http://aka.ms/vcpython27Chione.exe, 00000001.00000002.2925235748.0000016A2C410000.00000004.00001000.00020000.00000000.sdmpfalse
              high
              https://www.python.org/download/releases/2.3/mro/.Chione.exe, 00000001.00000002.2923586499.0000016A2B030000.00000004.00001000.00020000.00000000.sdmpfalse
                high
                https://github.com/boppreh/keyboard/issues/22)Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://github.com/mhammond/pywin32Chione.exe, 00000000.00000003.1688741593.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2932292153.00007FFE0CFB1000.00000002.00000001.01000000.0000001E.sdmp, Chione.exe, 00000001.00000002.2932658886.00007FFE0E182000.00000002.00000001.01000000.00000019.sdmp, Chione.exe, 00000001.00000002.2932397286.00007FFE0CFE1000.00000002.00000001.01000000.0000001B.sdmp, Chione.exe, 00000001.00000002.2932765677.00007FFE0EB2F000.00000002.00000001.01000000.0000001C.sdmpfalse
                    high
                    https://pyperclip.readthedocs.io/en/latest/index.html#not-implemented-errorChione.exe, 00000001.00000002.2927681140.0000016A2D390000.00000004.00001000.00020000.00000000.sdmpfalse
                      high
                      http://crl.usertrustChione.exe, 00000000.00000003.1683301707.0000015738205000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://mouseinfo.readthedocs.ioChione.exe, 00000001.00000002.2927768985.0000016A2D4A0000.00000004.00001000.00020000.00000000.sdmpfalse
                        high
                        http://docs.python.org/library/unittest.htmlChione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://github.com/python/importlib_metadata/issues/396d__Chione.exe, 00000001.00000002.2925090756.0000016A2C210000.00000004.00001000.00020000.00000000.sdmpfalse
                            high
                            https://setuptools.pypa.io/en/latest/Chione.exe, 00000001.00000002.2925163119.0000016A2C310000.00000004.00001000.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#Chione.exe, 00000001.00000002.2923803512.0000016A2B380000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1745130687.0000016A2B38B000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://goo.gl/zeJZl.Chione.exe, 00000001.00000002.2927768985.0000016A2D548000.00000004.00001000.00020000.00000000.sdmpfalse
                                high
                                https://packaging.python.org/en/latest/specifications/core-metadata/Chione.exe, 00000001.00000002.2925163119.0000016A2C310000.00000004.00001000.00020000.00000000.sdmpfalse
                                  high
                                  https://pypi.python.org/pypi/keyboard/):Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64Chione.exe, 00000001.00000002.2923968543.0000016A2B768000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1755233383.0000016A2B768000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://tip.tcl.tk/48)Chione.exe, 00000001.00000002.2924522333.0000016A2BD23000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://github.com/pypa/packagingChione.exe, 00000001.00000002.2925090756.0000016A2C210000.00000004.00001000.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2924946352.0000016A2C000000.00000004.00001000.00020000.00000000.sdmpfalse
                                          high
                                          http://ocsp.digicertChione.exe, 00000000.00000003.1680222811.0000015738205000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6Chione.exe, 00000001.00000003.1766021055.0000016A2BE82000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1765637145.0000016A2BE71000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2924743990.0000016A2BE59000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://cacerts.digicert.coChione.exe, 00000000.00000003.1685962817.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1678173406.0000015738205000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://refspecs.linuxfoundation.org/elf/gabi4Chione.exe, 00000001.00000002.2924946352.0000016A2C000000.00000004.00001000.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2925163119.0000016A2C310000.00000004.00001000.00020000.00000000.sdmpfalse
                                                high
                                                http://crl.sectigo.com/HChione.exe, 00000000.00000003.1683376874.0000015738205000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.iana.org/time-zones/repository/tz-link.htmlChione.exe, 00000001.00000003.1753868155.0000016A2BB30000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1754005489.0000016A2B76B000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1755233383.0000016A2B768000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://docs.python.org/3/library/subprocess#subprocess.Popen.killChione.exe, 00000001.00000002.2925308487.0000016A2C510000.00000004.00001000.00020000.00000000.sdmpfalse
                                                      high
                                                      https://upload.pypi.org/legacy/Chione.exe, 00000001.00000002.2925090756.0000016A2C210000.00000004.00001000.00020000.00000000.sdmpfalse
                                                        high
                                                        http://docs.python.org/library/itertools.html#recipesChione.exe, 00000001.00000002.2925018057.0000016A2C110000.00000004.00001000.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2924946352.0000016A2C000000.00000004.00001000.00020000.00000000.sdmpfalse
                                                          high
                                                          https://peps.python.org/pep-0685/Chione.exe, 00000001.00000002.2925235748.0000016A2C410000.00000004.00001000.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://github.com/platformdirs/platformdirsChione.exe, 00000001.00000002.2924946352.0000016A2C000000.00000004.00001000.00020000.00000000.sdmpfalse
                                                            high
                                                            https://peps.python.org/pep-0205/Chione.exe, 00000001.00000002.2924318115.0000016A2B8D0000.00000004.00001000.00020000.00000000.sdmpfalse
                                                              high
                                                              https://packaging.python.org/en/latest/specifications/entry-points/_repr__Chione.exe, 00000001.00000002.2925090756.0000016A2C210000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                high
                                                                http://docs.python.org/3/library/subprocess#subprocess.Popen.returncodeChione.exe, 00000001.00000002.2925308487.0000016A2C510000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://stackoverflow.com/questions/455434/how-should-i-use-formatmessage-properly-in-cChione.exe, 00000001.00000002.2927681140.0000016A2D390000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://gist.github.com/lyssdod/f51579ae8d93c8657a5564aefc2ffbcaChione.exe, 00000001.00000002.2924946352.0000016A2C000000.00000004.00001000.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2925163119.0000016A2C310000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688Chione.exe, 00000001.00000002.2923586499.0000016A2B0B8000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://www.eclipse.org/0Chione.exe, 00000000.00000003.1681463711.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680978198.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683301707.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680133821.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682453427.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680307464.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680749054.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683055544.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681266768.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683201457.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681053224.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682523283.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679803936.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683376874.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682681007.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682112694.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682383118.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681053224.0000015738205000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://crl.usertruststrtok_sucrtbase.strtok_sstrxfrmucrtbase.strxfrmtolowerucrtbase.tolowertoupperucChione.exe, 00000000.00000003.1683301707.0000015738205000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          https://github.com/pypa/setuptools/issues/1024.Chione.exe, 00000001.00000002.2925018057.0000016A2C110000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://sectigo.com/CPS0Chione.exe, 00000000.00000003.1683301707.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680133821.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682453427.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680307464.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680749054.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683055544.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681266768.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683201457.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679803936.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683376874.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682681007.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682383118.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681053224.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680488964.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681123506.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681697469.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681568169.0000015738205000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://packaging.python.org/en/latest/specifications/entry-points/Chione.exe, 00000001.00000002.2925090756.0000016A2C210000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://code.activestate.com/recipes/577452-a-memoize-decorator-for-instance-methods/Chione.exe, 00000001.00000002.2923968543.0000016A2B5B0000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1755423760.0000016A2B60F000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://github.com/python-pillow/Pillow/Chione.exe, 00000001.00000002.2925308487.0000016A2C510000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://setuptools.pypa.io/en/latest/pkg_resources.html#basic-resource-accessChione.exe, 00000001.00000003.1752152686.0000016A2BB30000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1752212147.0000016A2B748000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2923968543.0000016A2B5B0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/ConnectionChione.exe, 00000000.00000003.1691306040.0000015738205000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://pypi.org/project/build/).Chione.exe, 00000001.00000002.2925163119.0000016A2C310000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://setuptools.pypa.io/en/latest/references/keywords.html#keyword-namespace-packagesr%Chione.exe, 00000001.00000003.1752152686.0000016A2BB30000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1752152686.0000016A2BAF1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          • Avira URL Cloud: safe
                                                                                          unknown
                                                                                          http://crl3.digicerChione.exe, 00000000.00000003.1679389219.0000015738205000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://github.com/boppreh/keyboard/issues/20)Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/readerChione.exe, 00000001.00000002.2923803512.0000016A2B380000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1745130687.0000016A2B38B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                http://foo/bar.tgzChione.exe, 00000001.00000002.2924946352.0000016A2C000000.00000004.00001000.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2925163119.0000016A2C310000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  https://github.com/python/cpython/issues/86361.Chione.exe, 00000001.00000002.2923803512.0000016A2B3BB000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1750387165.0000016A2B754000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1751007002.0000016A2B754000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1750453263.0000016A2B6CD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    https://json.orgChione.exe, 00000001.00000002.2924522333.0000016A2BD23000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      http://mail.python.org/pipermail/python-dev/2012-June/120787.html.Chione.exe, 00000001.00000002.2927970004.0000016A2D5F0000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        https://www-cs-faculty.stanford.edu/~knuth/fasc2a.ps.gzChione.exe, 00000001.00000003.1754990052.0000016A2BBC0000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1754990052.0000016A2BC07000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1756310150.0000016A2BC31000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          http://www.cl.cam.ac.uk/~mgk25/iso-time.htmlChione.exe, 00000001.00000003.1753868155.0000016A2BB30000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1754005489.0000016A2B5C1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            https://github.com/boppreh/mouse)Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              https://stackoverflow.com/questions/4457745#4457745.Chione.exe, 00000001.00000002.2927768985.0000016A2D548000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                https://packaging.python.org/en/latest/guides/packaging-namespace-packages/.Chione.exe, 00000001.00000002.2925163119.0000016A2C310000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  https://packaging.python.org/en/latest/specifications/pyproject-toml/#declaring-project-metadata-theChione.exe, 00000001.00000002.2923968543.0000016A2B5B0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                    high
                                                                                                                    https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_syChione.exe, 00000001.00000002.2923803512.0000016A2B380000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1745130687.0000016A2B38B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                      high
                                                                                                                      https://www.python.org/psf/license/Chione.exe, 00000001.00000002.2931075607.00007FFDFB918000.00000004.00000001.01000000.00000005.sdmpfalse
                                                                                                                        high
                                                                                                                        https://github.com/boppreh/keyboard#api)Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                          high
                                                                                                                          http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tChione.exe, 00000000.00000003.1683301707.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680133821.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682453427.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680307464.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680749054.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683055544.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681266768.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683201457.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679803936.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682681007.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682383118.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681053224.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680488964.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681123506.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681697469.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681568169.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683301707.0000015738205000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                            high
                                                                                                                            https://docs.python.org/3/library/multiprocessing.htmlChione.exe, 00000001.00000002.2923968543.0000016A2B5B0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                              high
                                                                                                                              https://github.com/pypa/setuptools/issues/417#issuecomment-392298401Chione.exe, 00000001.00000002.2924393669.0000016A2B9D0000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                                                                high
                                                                                                                                https://github.com/python/importlib_metadata/issues/396Chione.exe, 00000001.00000002.2925090756.0000016A2C210000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                                                                  high
                                                                                                                                  https://github.com/boppreh/keyboard/archive/master.zip)Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                    high
                                                                                                                                    https://github.com/vs-marshall/ChioneChione.exe, 00000001.00000002.2927970004.0000016A2D63C000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                                                                      high
                                                                                                                                      http://docs.python.org/3/library/subprocess#subprocess.Popen.terminateChione.exe, 00000001.00000002.2925235748.0000016A2C410000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                                                                        high
                                                                                                                                        http://crl.sectigo.com/Chione.exe, 00000000.00000003.1683376874.0000015738205000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                          high
                                                                                                                                          https://github.com/pypa/packagingEI68722Chione.exe, 00000001.00000002.2925090756.0000016A2C210000.00000004.00001000.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2924946352.0000016A2C000000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                                                                            high
                                                                                                                                            http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#Chione.exe, 00000000.00000003.1683301707.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680133821.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682453427.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680307464.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680749054.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683055544.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681266768.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680222811.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683201457.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681053224.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682523283.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1679803936.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683376874.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682681007.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682112694.0000015738211000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1682383118.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1681053224.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1680488964.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000000.00000003.1683129186.0000015738205000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                              high
                                                                                                                                              https://github.com/boppreh/keyboard/issues/21)Chione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                high
                                                                                                                                                https://peps.python.org/pep-0685/0Chione.exe, 00000001.00000002.2925235748.0000016A2C410000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                                                                                • Avira URL Cloud: safe
                                                                                                                                                unknown
                                                                                                                                                https://bugs.python.org/issue44497.Chione.exe, 00000001.00000002.2925018057.0000016A2C110000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                                                                                  high
                                                                                                                                                  https://www.openssl.org/HChione.exe, 00000000.00000003.1685962817.0000015738205000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2929952449.00007FFDFB000000.00000002.00000001.01000000.00000012.sdmp, Chione.exe, 00000001.00000002.2930672008.00007FFDFB4F2000.00000002.00000001.01000000.00000011.sdmpfalse
                                                                                                                                                    high
                                                                                                                                                    https://setuptools.pypa.io/en/latest/pkg_resources.htmlChione.exe, 00000001.00000003.1752507695.0000016A2B73B000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1752152686.0000016A2BB30000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1752265609.0000016A2B73A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                    • Avira URL Cloud: safe
                                                                                                                                                    unknown
                                                                                                                                                    http://code.activestate.com/recipes/577916/Chione.exe, 00000001.00000002.2923968543.0000016A2B768000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1754990052.0000016A2BBC0000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1754990052.0000016A2BC07000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1755233383.0000016A2B768000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                      high
                                                                                                                                                      https://setuptools.pypa.io/en/latest/references/keywords.html#keyword-namespace-packagesr%r&NrlrChione.exe, 00000001.00000003.1752152686.0000016A2BB30000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1752152686.0000016A2BAF1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                      • Avira URL Cloud: safe
                                                                                                                                                      unknown
                                                                                                                                                      https://packaging.python.org/specifications/entry-points/Chione.exe, 00000001.00000002.2925018057.0000016A2C110000.00000004.00001000.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2924946352.0000016A2C000000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                                                                                        high
                                                                                                                                                        https://askubuntu.com/questions/697397/python3-is-not-supporting-gtk-moduleChione.exe, 00000001.00000002.2925453016.0000016A2C775000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                          high
                                                                                                                                                          https://github.com/jaraco/jaraco.functools/issues/5Chione.exe, 00000001.00000002.2924946352.0000016A2C000000.00000004.00001000.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1755423760.0000016A2B60F000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2925163119.0000016A2C310000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                                                                                            high
                                                                                                                                                            https://stackoverflow.com/questions/18905702/python-ctypes-and-mutable-buffersChione.exe, 00000001.00000002.2927681140.0000016A2D390000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                                                                                              high
                                                                                                                                                              https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.pyChione.exe, 00000001.00000003.1745130687.0000016A2B38B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                high
                                                                                                                                                                http://www.phys.uu.nl/~vgent/calendar/isocalendar.htmChione.exe, 00000001.00000003.1753868155.0000016A2BB30000.00000004.00000020.00020000.00000000.sdmp, Chione.exe, 00000001.00000003.1754005489.0000016A2B5C1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                  high
                                                                                                                                                                  https://importlib-resources.readthedocs.io/en/latest/using.html#migrating-from-legacyChione.exe, 00000001.00000002.2924946352.0000016A2C000000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                                                                                                    high
                                                                                                                                                                    http://foo/bar.tar.gzChione.exe, 00000001.00000002.2924946352.0000016A2C000000.00000004.00001000.00020000.00000000.sdmp, Chione.exe, 00000001.00000002.2925163119.0000016A2C310000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                                                                                                      high
                                                                                                                                                                      http://bugs.python.org/issue23606)Chione.exe, 00000001.00000002.2927611247.0000016A2CF40000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                                                                                                        high
                                                                                                                                                                        https://discord.gg/HpA7JdP3uqChione.exe, 00000001.00000002.2927970004.0000016A2D674000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                                                                                                          high
                                                                                                                                                                          https://github.com/boppreh/keyboardChione.exe, 00000001.00000002.2924522333.0000016A2BBEA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                            high
                                                                                                                                                                            https://peps.python.org/pep-0263/Chione.exe, 00000001.00000002.2930903704.00007FFDFB87B000.00000002.00000001.01000000.00000005.sdmp, python311.dll.0.drfalse
                                                                                                                                                                              high
                                                                                                                                                                              No contacted IP infos
                                                                                                                                                                              Joe Sandbox version:41.0.0 Charoite
                                                                                                                                                                              Analysis ID:1580959
                                                                                                                                                                              Start date and time:2024-12-26 14:18:09 +01:00
                                                                                                                                                                              Joe Sandbox product:CloudBasic
                                                                                                                                                                              Overall analysis duration:0h 8m 21s
                                                                                                                                                                              Hypervisor based Inspection enabled:false
                                                                                                                                                                              Report type:full
                                                                                                                                                                              Cookbook file name:default.jbs
                                                                                                                                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                                                                              Number of analysed new started processes analysed:8
                                                                                                                                                                              Number of new started drivers analysed:0
                                                                                                                                                                              Number of existing processes analysed:0
                                                                                                                                                                              Number of existing drivers analysed:0
                                                                                                                                                                              Number of injected processes analysed:0
                                                                                                                                                                              Technologies:
                                                                                                                                                                              • HCA enabled
                                                                                                                                                                              • EGA enabled
                                                                                                                                                                              • AMSI enabled
                                                                                                                                                                              Analysis Mode:default
                                                                                                                                                                              Analysis stop reason:Timeout
                                                                                                                                                                              Sample name:Chione.exe
                                                                                                                                                                              Detection:MAL
                                                                                                                                                                              Classification:mal64.spyw.winEXE@6/1004@0/0
                                                                                                                                                                              EGA Information:
                                                                                                                                                                              • Successful, ratio: 100%
                                                                                                                                                                              HCA Information:
                                                                                                                                                                              • Successful, ratio: 75%
                                                                                                                                                                              • Number of executed functions: 109
                                                                                                                                                                              • Number of non-executed functions: 141
                                                                                                                                                                              Cookbook Comments:
                                                                                                                                                                              • Found application associated with file extension: .exe
                                                                                                                                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                                                                                                                              • Excluded IPs from analysis (whitelisted): 172.202.163.200, 13.107.246.63
                                                                                                                                                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                                                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                                                                                              • Report size getting too big, too many NtCreateFile calls found.
                                                                                                                                                                              • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                                                                                                                                                                              • Report size getting too big, too many NtSetInformationFile calls found.
                                                                                                                                                                              No simulations
                                                                                                                                                                              No context
                                                                                                                                                                              No context
                                                                                                                                                                              No context
                                                                                                                                                                              No context
                                                                                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                              C:\Users\user\AppData\Local\Temp\_MEI68722\PIL\_imaging.cp311-win_amd64.pydSecuriteInfo.com.Win64.Malware-gen.26781.23689.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                SecuriteInfo.com.Win64.Evo-gen.17494.7440.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                  SecuriteInfo.com.Trojan.PWS.Stealer.35370.10650.6262.exeGet hashmaliciousLuna LoggerBrowse
                                                                                                                                                                                    C:\Users\user\AppData\Local\Temp\_MEI68722\PIL\_imagingcms.cp311-win_amd64.pydSecuriteInfo.com.Win64.Malware-gen.26781.23689.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                      SecuriteInfo.com.Win64.Evo-gen.17494.7440.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                        SecuriteInfo.com.Trojan.PWS.Stealer.35370.10650.6262.exeGet hashmaliciousLuna LoggerBrowse
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2581504
                                                                                                                                                                                          Entropy (8bit):6.4570322048454365
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:49152:pnJZ2yO4Iom0Uo+K7odkwMHALrLrLrLFcJiSx:jMLK7oKv
                                                                                                                                                                                          MD5:F9439D732C0E23BB3E5946766B9B25AC
                                                                                                                                                                                          SHA1:B94CA1150EC3A4C1E89DD5DBA8677A144EE02683
                                                                                                                                                                                          SHA-256:9303B4219ACA0E644CF6745A040A32F9971064014553A39162B099D14032B52B
                                                                                                                                                                                          SHA-512:D90DF0EBDE0D8A814B18D714DF03B930A964BA0582DB48BC5AC13F3AB12F3F6EAD6D399A28B7A8A4B569039000CB397022427874D7293353058B0747F24C5502
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Joe Sandbox View:
                                                                                                                                                                                          • Filename: SecuriteInfo.com.Win64.Malware-gen.26781.23689.exe, Detection: malicious, Browse
                                                                                                                                                                                          • Filename: SecuriteInfo.com.Win64.Evo-gen.17494.7440.exe, Detection: malicious, Browse
                                                                                                                                                                                          • Filename: SecuriteInfo.com.Trojan.PWS.Stealer.35370.10650.6262.exe, Detection: malicious, Browse
                                                                                                                                                                                          Reputation:low
                                                                                                                                                                                          Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$..........%.}.v.}.v.}.v..)v.}.v...w.}.v..Gv.}.v...w.}.v...w.}.v...w.}.vw..w.}.v...w.}.v.}.v.|.v.}.v.}.v...w.|.v...w.}.v...w.}.v..Ev.}.v...w.}.vRich.}.v........................PE..d.....e.........." ...%............,U........................................'...........`.........................................p.%.`.....%.......'.......&...............'.....P{$......................{$.(....z$.@............................................text............................... ..`.rdata..4).......*..................@..@.data........&..`....%.............@....pdata........&......@&.............@..@.rsrc.........'......L'.............@..@.reloc........'......N'.............@..B........................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):262656
                                                                                                                                                                                          Entropy (8bit):6.288933748990941
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6144:hIzOs0LsbbcOYRI7OrhdlnLg9uP1+74/LgHmPr9qvZqhLaHLTLrLfqeqwL/gQ5gr:WzOs0OGhdlnLg9uP1+74/LgHmPr9qvZq
                                                                                                                                                                                          MD5:558AEF4430544AA81DF9A3620859B28C
                                                                                                                                                                                          SHA1:C7ED2F826F83233765323FBCACEDC8B90A7EEC71
                                                                                                                                                                                          SHA-256:87BED23608193574211D492BCAE6F1C1019F856832E63C49E8CCED5FBA6423E8
                                                                                                                                                                                          SHA-512:C0A7C0DF7718087A9CE26E60553A6F69129E8631446B5F44677B0FDDC430DE2FC193D65F0496BE461CF2238324ACDEEAD640186E5BEADB686FC647B3309D665F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Joe Sandbox View:
                                                                                                                                                                                          • Filename: SecuriteInfo.com.Win64.Malware-gen.26781.23689.exe, Detection: malicious, Browse
                                                                                                                                                                                          • Filename: SecuriteInfo.com.Win64.Evo-gen.17494.7440.exe, Detection: malicious, Browse
                                                                                                                                                                                          • Filename: SecuriteInfo.com.Trojan.PWS.Stealer.35370.10650.6262.exe, Detection: malicious, Browse
                                                                                                                                                                                          Reputation:low
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........V[jw8.jw8.jw8.c...dw8...9.hw8...=.gw8...<.bw8...;.nw8...9.hw8.!.9.mw8.jw9..w8.P.0.|w8.P.8.kw8.P...kw8.P.:.kw8.Richjw8.........PE..d.....e.........." ...%....."......<........................................@............`.............................................h...h........ .........../...........0.......`..............................p_..@...............p............................text............................... ..`.rdata.............................@..@.data....?.......:..................@....pdata.../.......0..................@..@.rsrc........ ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1800704
                                                                                                                                                                                          Entropy (8bit):6.767669682605555
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24576:L3wqBMikcxcpChMsUF/vzVunRT+53YAxX5OT5uFzdjd5p+Jvs1ZnANwOll4:LAEDFhMsUZVunZ+BFz55p+Jvs0v4
                                                                                                                                                                                          MD5:569DD93B5AF5860D0CBB0D53FC21E272
                                                                                                                                                                                          SHA1:ECA48288BD4E0BC74BFAF6E67C874651E57099D4
                                                                                                                                                                                          SHA-256:0264BA60E4AB821439FD459E7C222446CE5B5AB67705714E893288BB4FDB2261
                                                                                                                                                                                          SHA-512:0C9244DE1DA6D3D99F89C534A1BF6428EB23532B5168E0A6F4C9577EE182FCE3625614881E279A3035E43FBDB611739220665A6BE26BA3FDF5D1DBFEC106C047
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Reputation:low
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........qB.s...s...s.......s.......s.......s.......s.......s.......s.......s..Y....s...s...s.......s.......s.......s.......s.......s.......s..Rich.s..........PE..d.....e.........." ...%.....r............................................................`.........................................Pi..d....i..................0.......................................................@............ ..@............................text............................... ..`.rdata...X... ...Z..................@..@.data................j..............@....pdata..0...........................@..@_RDATA..0............h..............@..@.rsrc................j..............@..@.reloc...............l..............@..B................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):24064
                                                                                                                                                                                          Entropy (8bit):5.587107570642976
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:WmwU5804Pp/4TsXwCrhBOa8j65SGUkOgyJ+:bp80s4T/Crhsp65I+
                                                                                                                                                                                          MD5:EF3C4398231261CA7A3D8EE43FD9B3AC
                                                                                                                                                                                          SHA1:8AEB32EB678DEAD58E882CB54563E837A8F7405B
                                                                                                                                                                                          SHA-256:595EBD9CCADF1E5359130753CAB00E14990C7369940493F15CA84E151A9F35B3
                                                                                                                                                                                          SHA-512:9C8EC8595856562B4491073E14B8356FFCD9C44FD369E577B2FE86E2EE5904D3789D52CAB9B7F331F411CD71695DA600399B1C36053531239E420FE503CAF2FA
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Reputation:low
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........@...@...@......@...A...@..A...@...E...@...D...@...C...@.[.A...@...A...@..`H...@..`@...@..`....@..`B...@.Rich..@.........PE..d.....e.........." ...%.4...,.......8....................................................`.........................................``..h....`..x...............P...............@....U...............................S..@............P..`............................text...X3.......4.................. ..`.rdata.. ....P.......8..............@..@.data........p.......P..............@....pdata..P............R..............@..@.rsrc................Z..............@..@.reloc..@............\..............@..B................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):14848
                                                                                                                                                                                          Entropy (8bit):4.936810843366955
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:Dq/Ztwu+7WM00KpbQoSM8ZPdIFoLckgTfgZ:GZoHKpcoSf2o7gTo
                                                                                                                                                                                          MD5:DAF5247E3BCA658F1E1C46D41366D6B2
                                                                                                                                                                                          SHA1:7D604EB863F98184F2D46F2A92B54CE1C433777D
                                                                                                                                                                                          SHA-256:8C80BD1CF8782B5F7AB49A25B1E6A7A14E97E8A72174FD0BFDA5726C2B3C567B
                                                                                                                                                                                          SHA-512:2A5D1D0741E834100E424306632232586741263E1B91B35C9BE1A8D0ADE43885EA9B2BB3B4C1BFCDF5B2FF0513DCC1E64D8187915EEC4799FAD84FB5241E0C64
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........s>H..mH..mH..mA.mB..m]..lJ..m]..lD..m]..l@..m]..lK..m...lJ..m...lM..mH..m|..mr5.lJ..mr5.lI..mr5.mI..mr5.lI..mRichH..m................PE..d.....e.........." ...%.....$......@.....................................................`.........................................p;..d....;.......p.......`..................<...`5.............................. 4..@............0...............................text...h........................... ..`.rdata.......0......................@..@.data........P.......0..............@....pdata.......`.......2..............@..@.rsrc........p.......6..............@..@.reloc..<............8..............@..B........................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):534528
                                                                                                                                                                                          Entropy (8bit):6.583005042873053
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12288:n0QIgnVCZh4nbXy8mAC1tQzLrLrLrLWmE5Gx0Hs/Ja:n04wwnbXBzLrLrLrLWmE60Hs/Ja
                                                                                                                                                                                          MD5:8597884C60D295C3299D47B67E907D40
                                                                                                                                                                                          SHA1:E62006CCFA4C8F5B998163E8D1575625663F2CCD
                                                                                                                                                                                          SHA-256:EED91BF609DA0C72BC480801342FAB307B1D2ABE1F5F77D4C591163FC59763F0
                                                                                                                                                                                          SHA-512:7367A23EDE2562347D8DEEE7CBC8A89FB11764B78F790F6D009B2BAFF7127B342599A3B5523F58E2569862E4E1CC1C26AF816E995A3C91C33B32D427F979024B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........l....w...w...w..u....w..rv...w..uv...w..rr...w..rs...w..rt...w..pv...w...v...w..s...w......w..w...w.....w..u...w.Rich..w.........................PE..d.....e.........." ...%..................................................................`.............................................\............p....... ..TN..................`W.............................. V..@............................................text............................... ..`.rdata..............................@..@.data....2..........................@....pdata..TN... ...P..................@..@.rsrc........p.......$..............@..@.reloc...............&..............@..B........................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):109440
                                                                                                                                                                                          Entropy (8bit):6.642252418996898
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:1536:BcghDMWyjXZZIzpdbJhKm6Kuzu8fsecbq8uOFQr+zMtY+zA:BVHyQNdbJAKuzRsecbq8uOFvyU
                                                                                                                                                                                          MD5:49C96CECDA5C6C660A107D378FDFC3D4
                                                                                                                                                                                          SHA1:00149B7A66723E3F0310F139489FE172F818CA8E
                                                                                                                                                                                          SHA-256:69320F278D90EFAAEB67E2A1B55E5B0543883125834C812C8D9C39676E0494FC
                                                                                                                                                                                          SHA-512:E09E072F3095379B0C921D41D6E64F4F1CD78400594A2317CFB5E5DCA03DEDB5A8239ED89905C9E967D1ACB376B0585A35ADDF6648422C7DDB472CE38B1BA60D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........{n...=...=...=l..<...=...=...=...=...=...<...=...<...=...<...=...<...=...=...=...<...=Rich...=........PE..d.....K..........." ...$.....`............................................................`A........................................`C..4....K...............p..|....\...O...........-..p............................,..@............................................text............................... ..`.rdata...A.......B..................@..@.data...0....`.......D..............@....pdata..|....p.......H..............@..@_RDATA..\............T..............@..@.rsrc................V..............@..@.reloc...............Z..............@..B................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):49560
                                                                                                                                                                                          Entropy (8bit):6.6649899041961875
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:a0Q4HUcGJZekJSam1BbuBSYcCZbiLzlSHji9z4GwZHji9znwT:afnDex5izbiLzlE+z4Gwl+zwT
                                                                                                                                                                                          MD5:CF0A1C4776FFE23ADA5E570FC36E39FE
                                                                                                                                                                                          SHA1:2050FADECC11550AD9BDE0B542BCF87E19D37F1A
                                                                                                                                                                                          SHA-256:6FD366A691ED68430BCD0A3DE3D8D19A0CB2102952BFC140BBEF4354ED082C47
                                                                                                                                                                                          SHA-512:D95CD98D22CA048D0FC5BCA551C9DB13D6FA705F6AF120BBBB621CF2B30284BFDC7320D0A819BB26DAB1E0A46253CC311A370BED4EF72ECB60C69791ED720168
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........V...V...V......T.......T..._.D.]...V...e.......S.......Q.......M.......W.....(.W.......W...RichV...........PE..d...}.4..........." ...$.<...8.......A..............................................e4....`A........................................0m.......m..x....................r...O......D....c..p...........................pb..@............P..h............................text...@:.......<.................. ..`.rdata..."...P...$...@..............@..@.data................d..............@....pdata...............f..............@..@.rsrc................l..............@..@.reloc..D............p..............@..B................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):65304
                                                                                                                                                                                          Entropy (8bit):6.187244032149753
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:1536:92icaMc9076gzE6+gTKnEzRIsOnev7SyP4xw:92icrclGE6+gTOEzRIsOn2V
                                                                                                                                                                                          MD5:511A52BCB0BD19EDA7AA980F96723C93
                                                                                                                                                                                          SHA1:B11AB01053B76EBB60AB31049F551E5229E68DDD
                                                                                                                                                                                          SHA-256:D1FB700F280E7793E9B0DCA33310EF9CD08E9E0EC4F7416854DFFAF6F658A394
                                                                                                                                                                                          SHA-512:D29750950DB2ECBD941012D7FBDD74A2BBD619F1A92616A212ACB144DA75880CE8A29EC3313ACBC419194219B17612B27A1833074BBBAA291CDB95B05F8486FF
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........T.i..i..i......i.v.h..i.v.l..i.v.m..i.v.j..i...h..i...h..i..h.V.i...d..i...i..i.....i...k..i.Rich.i.........................PE..d....k.d.........." ...$.R..........`...............................................'.....`.............................................P...`...d......................../..........`w..T........................... v..@............p...............................text....P.......R.................. ..`.rdata..~J...p...L...V..............@..@.data...............................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):84760
                                                                                                                                                                                          Entropy (8bit):6.571366239395909
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:1536:+O1z7poK78xa5yp6aclDqGihM8Vh948L5IsCVQ7SyhxG:31z9h9plDshvVhH5IsCVQk
                                                                                                                                                                                          MD5:4438AFFAAA0CA1DF5B9B1CDAA0115EC1
                                                                                                                                                                                          SHA1:4EDA79EAF3DE614D5F744AA9EEA5BFCF66E2D386
                                                                                                                                                                                          SHA-256:EC91E2B4BACA31B992D016B84B70F110CE2B1B2DFD54F5E5BEF6270ED7D13B85
                                                                                                                                                                                          SHA-512:6992107AC4D2108E477BC81AF667B8B8E5439231E7E9F4B15CE4BCE1AEEA811BC0F1AAA438BE3B0E38597760CB504367512809EE1937C4B538A86724AE543BA6
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........,...B...B...B......B.i.C...B.i.....B.i.G...B.i.F...B.i.A...B..C...B..C...B...C..B..O...B..B...B......B..@...B.Rich..B.........................PE..d....k.d.........." ...$.....^...............................................P......2.....`.........................................p...H............0....... .. ......../...@..........T...........................p...@............................................text............................... ..`.rdata..L>.......@..................@..@.data...............................@....pdata.. .... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):181248
                                                                                                                                                                                          Entropy (8bit):6.186854863391558
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3072:nmHfhrWGYV6sewRdFRId6PBNKcqDn/C1j/UyS7viSTLkKxalPu//ay/i:nmprWX6sPRNPBAn/0/dCiSTLL0P2/ay
                                                                                                                                                                                          MD5:210DEF84BB2C35115A2B2AC25E3FFD8F
                                                                                                                                                                                          SHA1:0376B275C81C25D4DF2BE4789C875B31F106BD09
                                                                                                                                                                                          SHA-256:59767B0918859BEDDF28A7D66A50431411FFD940C32B3E8347E6D938B60FACDF
                                                                                                                                                                                          SHA-512:CD5551EB7AFD4645860C7EDD7B0ABD375EE6E1DA934BE21A6099879C8EE3812D57F2398CAD28FBB6F75BBA77471D9B32C96C7C1E9D3B4D26C7FC838745746C7F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........ ..MA.CMA.CMA.CD9MCAA.C.4.BOA.C+.#CIA.C.4.BFA.C.4.BEA.C.4.BIA.C.9.BIA.C.=.BNA.CMA.C.A.C.4.BIA.CD9KCLA.C.4.BLA.C.4!CLA.C.4.BLA.CRichMA.C........................PE..d...,..e.........." .........@..............................................0............`..........................................g..l...|g..................<............ .......M...............................M..8............................................text............................... ..`.rdata..l...........................@..@.data....\.......0...v..............@....pdata..<...........................@..@.rsrc...............................@..@.reloc....... ......................@..B................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):123672
                                                                                                                                                                                          Entropy (8bit):6.0603476725812415
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3072:T7u5LnIxdP3fPHW+gfLIhAxKpemWtIsLPKlY:Tw+3FgfLIhFemWeY
                                                                                                                                                                                          MD5:6114277C6FC040F68D25CA90E25924CD
                                                                                                                                                                                          SHA1:028179C77CB3BA29CD8494049421EAA4900CCD0E
                                                                                                                                                                                          SHA-256:F07FE92CE85F7786F96A4D59C6EE5C05FE1DB63A1889BA40A67E37069639B656
                                                                                                                                                                                          SHA-512:76E8EBEFB9BA4EA8DCAB8FCE50629946AF4F2B3F2F43163F75483CFB0A97968478C8AAEF1D6A37BE85BFC4C91A859DEDA6DA21D3E753DAEFE084A203D839353D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........D...D...D...M.".B......F......H......L......@...^..F......E......B......G...D.......^..B...^..E...^.N.E...^..E...RichD...........PE..d....k.d.........." ...$............p\..............................................[.....`.........................................pP.......P.........................../..............T...........................`...@............................................text............................... ..`.rdata...l.......n..................@..@.data...$=...p...8...^..............@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):253720
                                                                                                                                                                                          Entropy (8bit):6.554150968006557
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6144:3V9E1CyOa72oP+pG1/dgD09qWM53pLW1ADDtLRO75e:jEgyOa72jw1/d4VVhLE5e
                                                                                                                                                                                          MD5:BE315973AFF9BDEB06629CD90E1A901F
                                                                                                                                                                                          SHA1:151F98D278E1F1308F2BE1788C9F3B950AB88242
                                                                                                                                                                                          SHA-256:0F9C6CC463611A9B2C692382FE1CDD7A52FEA4733FFAF645D433F716F8BBD725
                                                                                                                                                                                          SHA-512:8EA715438472E9C174DEE5ECE3C7D9752C31159E2D5796E5229B1DF19F87316579352FC3649373DB066DC537ADF4869198B70B7D4D1D39AC647DA2DD7CFC21E8
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........Q.`...`...`.......`..,....`..,....`..,....`..,....`.......`.......`...`...`.......`.......`.......`....r..`.......`..Rich.`..........................PE..d....k.d.........." ...$.x...<......|...............................................>.....`.........................................0T..P....T...................'......./......P.......T...........................p...@............................................text...-w.......x.................. ..`.rdata..|............|..............@..@.data....*...p...$...T..............@....pdata...'.......(...x..............@..@.rsrc...............................@..@.reloc..P...........................@..B........................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):65304
                                                                                                                                                                                          Entropy (8bit):6.256836184121913
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:1536:nfKlLLgy209/MkZy6nR3JZlivy7OjZopRIsOI/7SyAxn4:fKBgy+IZlh7OjSpRIsOI/M4
                                                                                                                                                                                          MD5:1524882AF71247ADECF5815A4E55366A
                                                                                                                                                                                          SHA1:E25014C793C53503BDFF9AF046140EDDA329D01B
                                                                                                                                                                                          SHA-256:6F7742DFDD371C39048D775F37DF3BC2D8D4316C9008E62347B337D64EBED327
                                                                                                                                                                                          SHA-512:5B954BB7953F19AA6F7C65AD3F105B77D37077950FB1B50D9D8D337BDD4B95343BAC2F4C9FE17A02D1738D1F87EEEF73DBBF5CDDDCB470588CBC5A63845B188A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........,'@.MI..MI..MI..5...MI.:3H..MI.:3L..MI.:3M..MI.:3J..MI..2H..MI..5H..MI.G0H..MI..MH..MI..2D..MI..2I..MI..2...MI..2K..MI.Rich.MI.........PE..d....l.d.........." ...$.T...~......@@...............................................7....`............................................P... ............................/......X...P}..T............................|..@............p..0............................text....S.......T.................. ..`.rdata...O...p...P...X..............@..@.data...8...........................@....pdata..............................@..@.rsrc...............................@..@.reloc..X...........................@..B........................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):159000
                                                                                                                                                                                          Entropy (8bit):6.8491410545695715
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3072:2tZVL5rdV/REWWjAYyznf49mNo+RRApqc5IsZ1v8N:2tZV3pREMAYO+ElG
                                                                                                                                                                                          MD5:737119A80303EF4ECCAA998D500E7640
                                                                                                                                                                                          SHA1:328C67C6C4D297AC13DA725BF24467D8B5E982E3
                                                                                                                                                                                          SHA-256:7158C1290AC29169160B3EC94D9C8BCDE4012D67A555F325D44B418C54E2CC28
                                                                                                                                                                                          SHA-512:1C9920E0841A65B01A0B339C5F5254D1039EF9A16FE0C2484A7E2A9048727F2CC081817AA771B0C574FB8D1A5A49DC39798A3C5E5B5E64392E9C168E1827BE7C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B..'..lt..lt..lt...t..lt..mu..lt..iu..lt..hu..lt..ou..lt..mu..ltM.mu..lt..mt`.lt..au<.lt..lu..lt..t..lt..nu..ltRich..lt................PE..d....l.d.........." ...$.b...........5....................................................`..........................................%..L...\%..x....p.......P.......>.../......8.......T...........................p...@............................................text...za.......b.................. ..`.rdata..............f..............@..@.data........@......................@....pdata.......P......................@..@.rsrc........p.......2..............@..@.reloc..8............<..............@..B........................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):34584
                                                                                                                                                                                          Entropy (8bit):6.410940768849398
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:hXI6RwgJ5xeDTdywGnJ8BIsWt6F5YiSyvWKAMxkE9:pIoJ5UDTdywGJ8BIsWt6L7SyuoxB
                                                                                                                                                                                          MD5:2CA9FE51BF2EE9F56F633110A08B45CD
                                                                                                                                                                                          SHA1:88BA6525C71890A50F07547A5E9EAD0754DD85B9
                                                                                                                                                                                          SHA-256:1D6F1E7E9F55918967A37CBD744886C2B7EE193C5FB8F948132BA40B17119A81
                                                                                                                                                                                          SHA-512:821551FA1A5AA21F76C4AE05F44DDD4C2DAA00329439C6DADC861931FA7BD8E464B4441DFE14383F2BB30C2FC2DFB94578927615B089A303AA39240E15E89DE5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........G.*.&.y.&.y.&.y.^.y.&.yFX.x.&.yFX.x.&.yFX.x.&.yFX.x.&.y.Y.x.&.y.&.y.&.y.^.x.&.y.Y.x.&.y.Y.x.&.y.Y}y.&.y.Y.x.&.yRich.&.y........PE..d....k.d.........." ...$.....<......0.....................................................`.........................................0D..`....D..x....p.......`.......X.../...........4..T...........................p3..@............0...............................text............................... ..`.rdata..^....0... ..."..............@..@.data........P.......B..............@....pdata.......`.......H..............@..@.rsrc........p.......L..............@..@.reloc...............V..............@..B................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):50968
                                                                                                                                                                                          Entropy (8bit):6.433137711787963
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:A1MCcP4W1vqJiR5RMJl5XikC6r2lIsXtw5YiSyvUYAMxkEb:A1MiJifvkCllIsXti7SysGxf
                                                                                                                                                                                          MD5:AC053EF737E4F13B02BFA81F9E46170B
                                                                                                                                                                                          SHA1:5D8EBEB30671B74D736731696FEDC78C89DA0E1F
                                                                                                                                                                                          SHA-256:CB68E10748E2EFD86F7495D647A2774CEA9F97AD5C6FE179F90DC1C467B9280F
                                                                                                                                                                                          SHA-512:6AC26F63981DC5E8DFB675880D6C43648E2BBE6711C75DCAC20EBE4D8591E88FBFAC3C60660AB28602352760B6F5E1CB587075072ABD3333522E3E2549BFA02E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........{.wo(.wo(.wo(...(.wo(..n).wo(..j).wo(..k).wo(..l).wo(..n).wo(.wn(.wo(..n).wo(..k).wo(..b).wo(..o).wo(...(.wo(..m).wo(Rich.wo(........................PE..d....k.d.........." ...$.B...X............................................................`.........................................0...X................................/......,....f..T...........................Pe..@............`...............................text...^A.......B.................. ..`.rdata..$5...`...6...F..............@..@.data................|..............@....pdata..............................@..@.rsrc...............................@..@.reloc..,...........................@..B........................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):32536
                                                                                                                                                                                          Entropy (8bit):6.452372346765785
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:K+yFV6rXMmxU9tIsQUl5YiSyvYAMxkEl1C:K+wEXMWU9tIsQUr7SyexXC
                                                                                                                                                                                          MD5:8BBED19359892F8C95C802C6AD7598E9
                                                                                                                                                                                          SHA1:773FCA164965241F63170E7A1F3A8FA17F73EA18
                                                                                                                                                                                          SHA-256:4E5B7C653C1B3DC3FD7519E4F39CC8A2FB2746E0ECDC4E433FE6029F5F4D9065
                                                                                                                                                                                          SHA-512:22EA7667689A9F049FA34DDAE6B858E1AF3E646A379D2C5A4AEF3E74A4FF1A4109418B363C9BE960127F1C7E020AA393A47885BC45517C9E9AEBE71EC7CB61A0
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........7X.Y..Y..Y......Y.v.X..Y.v.\..Y.v.]..Y.v.Z..Y...X..Y...X..Y..X...Y...T..Y...Y..Y.....Y...[..Y.Rich.Y.........................PE..d....k.d.........." ...$.....8............................................................`..........................................C..L....C..d....p.......`.......P.../..........p4..T...........................03..@............0..0............................text............................... ..`.rdata..R....0......................@..@.data...x....P.......<..............@....pdata.......`.......@..............@..@.rsrc........p.......D..............@..@.reloc...............N..............@..B................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):79640
                                                                                                                                                                                          Entropy (8bit):6.290503224602847
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:1536:zbflGOzI+Jmrc0r3uj+9/s+S+pzpDAiTFVf78tIsLwy7SyJx+:V/IMA3uj+9/sT+pztAYFVT8tIsLwyA
                                                                                                                                                                                          MD5:64A6C475F59E5C57B3F4DD935F429F09
                                                                                                                                                                                          SHA1:CA2E0719DC32F22163AE0E7B53B2CAADB0B9D023
                                                                                                                                                                                          SHA-256:D03FA645CDE89B4B01F4A2577139FBB7E1392CB91DC26213B3B76419110D8E49
                                                                                                                                                                                          SHA-512:CF9E03B7B34CC095FE05C465F9D794319AAA0428FE30AB4DDCE14BA78E835EDF228D11EC016FD31DFE9F09D84B6F73482FB8E0F574D1FD08943C1EC9E0584973
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........e...e...e.......e..N....e..N....e..N....e..N....e.......e...e..Re.......e.......e.......e....{..e.......e..Rich.e..................PE..d....l.d.........." ...$.l...........%.......................................P......e]....`.............................................P............0....... ..x......../...@..........T...............................@............................................text...6k.......l.................. ..`.rdata...t.......v...p..............@..@.data...............................@....pdata..x.... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):176920
                                                                                                                                                                                          Entropy (8bit):5.954664688637172
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3072:LFIQQShnmJg0ADm8H4qIOuXo6XHFBN9d41Olh59YL48PMrN/WgAlNzn5IsC7/1a:GShmaJDm24q6o6XHR4BLrT
                                                                                                                                                                                          MD5:A0B40F1F8FC6656C5637EACACF7021F6
                                                                                                                                                                                          SHA1:38813E25FFDE1EEE0B8154FA34AF635186A243C1
                                                                                                                                                                                          SHA-256:79D861F0670828DEE06C2E3523E2F9A2A90D6C6996BDE38201425AA4003119F1
                                                                                                                                                                                          SHA-512:C18855D7C0069FFF392D422E5B01FC518BBDF497EB3390C0B333ECAC2497CD29ABBDAE4557E4F0C4E90321FBA910FC3E4D235CE62B745FA34918F40FA667B713
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!...@.L.@.L.@.L.8$L.@.L.>.M.@.L.>.M.@.L.>.M.@.L.>.M.@.L.?.M.@.Lw=.M.@.L.@.L A.L.8.M.@.L.?.M.@.L.?.M.@.L.?HL.@.L.?.M.@.LRich.@.L........PE..d....l.d.........." ...$............l+....................................................`.........................................0...d................................/......|...P...T...............................@............................................text............................... ..`.rdata...".......$..................@..@.data...............................@....pdata...............\..............@..@.rsrc................h..............@..@.reloc..|............r..............@..B........................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):64280
                                                                                                                                                                                          Entropy (8bit):6.282755412780691
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:99v6F7Q04EaJQCENX7Twu2zsdMT81LGAKLMP2SJxkfRIsOST5YiSyv6k1AMxkEW:nyF7XUEB7q81CvguSJORIsOSd7SyTNxq
                                                                                                                                                                                          MD5:89F47CD630F7DFA63268FBC52D04F9E9
                                                                                                                                                                                          SHA1:0CC250DF4C2F44D8CA8820756F9F05DF1E893E28
                                                                                                                                                                                          SHA-256:8E4CAB61B3838F9545B5D1E0B287F18C22D360B8E6A8DACA4178CC69DF78F83D
                                                                                                                                                                                          SHA-512:BD2406EA0D5396DF0153AC22CE55CA49615291EAD6419A96E99007AC85059054A718C4F98942E0ADB23DA85899F145504B79772866D683A9A686FDE6ADE784E0
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......j.y.............'...(.......,.......#.......&.......-...4...,...e...,.......+...........4...,...4.../...4../...4.../...Rich............PE..d....l.d.........." ...$.h...f............................................................`.............................................P.............................../......$......T...............................@............................................text..._f.......h.................. ..`.rdata...@.......B...l..............@..@.data...............................@....pdata..............................@..@.rsrc...............................@..@.reloc..$...........................@..B........................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):14216
                                                                                                                                                                                          Entropy (8bit):7.01760380268691
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:FaW1hWrrUSwv7s8jtGBIYiYF8oDbnPZ2oEhZnpHzGoj6gSyekD/oB:kW1hWrrU8JIYiaHZ8ZpHzGovSyekDgB
                                                                                                                                                                                          MD5:1EF2FEBE64A22D3FC743652CE34D4C10
                                                                                                                                                                                          SHA1:75E836C2536A4130CB4E982E935898B6ACEA7E1D
                                                                                                                                                                                          SHA-256:2BFEC3E54115359A56B3CD7ADA60AC172AB43F56C8C5E8B88245F64CE631137D
                                                                                                                                                                                          SHA-512:CB77D96B1175B7A3A967685587E8C877A479668B8D8953083C33B0A886E62767412F97ACAF8EC447920BB9387ED88931B5CFADA730D475FFEF11DA32068A8F07
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d................." .........................................................0......4[....`.........................................`...,............ ...................)..............T............................................................................rdata..,...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):13704
                                                                                                                                                                                          Entropy (8bit):7.028944638116312
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:1UW1hWVUSwv7s8jtGBIYiYF8oDbnPZ2oEhZnpHzGoj6gLyyWjtDPxUR:WW1hWVU8JIYiaHZ8ZpHzGovLyyqtDPx8
                                                                                                                                                                                          MD5:8A5BCAE4A3EA52E61DCED9F54DA3746E
                                                                                                                                                                                          SHA1:021C3DB7739694940C1D5AEF554E13F9383C2BA2
                                                                                                                                                                                          SHA-256:B8A4371FAFD2DCB76C24855A1FCA311FB98CF270E539B4FD3091A6738EF71622
                                                                                                                                                                                          SHA-512:69AA71183FA8DDA2432502E9F9BB6FEA22CAE374DA919622D233A83600786106FA47EE5441A6D6451E8F6D448DBCD2EE108623628FC454FD962FBFAB524734C2
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d....F.L.........." .........................................................0......H.....`.........................................`................ ...................)..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):13704
                                                                                                                                                                                          Entropy (8bit):7.034638464589457
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:nW1hWVUSwv7s8jtGBIYiYF8oDbnPZ2oEhZnpHzGoj6g9y+ttIqL3:nW1hWVU8JIYiaHZ8ZpHzGov9y+8qz
                                                                                                                                                                                          MD5:BAD51D0BCBE4B83F44DEA9882DAA72A9
                                                                                                                                                                                          SHA1:41EAF283255BF6079A10F53081BF794E33BC4479
                                                                                                                                                                                          SHA-256:37A4972C68465A9B1A8820BCF358AB31AD8E518E19E1BC0835996DD9223B23FA
                                                                                                                                                                                          SHA-512:CD6C50592A4041E98FE9791506C25D45F2EDD027BA2DAF1421C764CD6362DF0A9A968347747820B1488F2B3C7169CDB9B027FC63D3086F5B02A703C2F8F95B85
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d....C............" .........................................................0.......A....`.........................................`................ ...................)..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):13704
                                                                                                                                                                                          Entropy (8bit):7.078874109258194
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:OBLW1hWQU8JIYiaHZ8ZpHzGovPOxyDzNm:OBOeYiQZiRPYgQ
                                                                                                                                                                                          MD5:8B191A93051DDA5664E644948AA51797
                                                                                                                                                                                          SHA1:3D3FD3F63610655293C133C0FBDDE3DBF262D308
                                                                                                                                                                                          SHA-256:EBDD6DC490EDF3676A57548044709455AE90166E58601F196E9B23E6D7B9B4EE
                                                                                                                                                                                          SHA-512:0ACA85D416560D9547013BA0310F24A13F74B306D632A2BC7D2649C6E8B6D119E34BEBE4271C684674B22E494B1CAF6A3094E6E205C99879A724E490E21D88A9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d.....Z..........." .........................................................0............`.........................................`................ ...................)..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):17288
                                                                                                                                                                                          Entropy (8bit):6.918132786626859
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:pBPvVXcW1hWUU8JIYiaHZ8ZpHzGovOyyXN:3PvVX/OYiQZiRPOhd
                                                                                                                                                                                          MD5:4F4AD57EFB22BEA723E162542BF8E43C
                                                                                                                                                                                          SHA1:4223CC1C429FF9A18468A91798AF3F2575424A4A
                                                                                                                                                                                          SHA-256:99FF47C7E846F7759FADF5BCED9BCDBA275B9C8E206BF8E453C3473EF29CF1F3
                                                                                                                                                                                          SHA-512:3EA405798400A96FA1D1CCA1AE8A55C4BA53713320133078081F3A55CCCD5509954BC1620DBF2961C9A9247850B88D567F1B6BBE2F484814F68BB895A75F5C16
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d....Q............" .........................................................@......`.....`.........................................`................0...................)..............T............................................................................rdata..............................@..@.rsrc........0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):13704
                                                                                                                                                                                          Entropy (8bit):7.051707672847843
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:0XW1hWsUSwv7s8jtGBIYiYF8oDbnPZ2oEhZnpHzGoj6gJyiH4sw9j9wFq:YW1hWsU8JIYiaHZ8ZpHzGovJyH9j+0
                                                                                                                                                                                          MD5:B4E78652F6AA8F89062DBD0E7BEE1DED
                                                                                                                                                                                          SHA1:CAF3D012D3B1CF09C47EF0DC55F075D931798D5E
                                                                                                                                                                                          SHA-256:D79F192963618F86D2A0E768BDAB8E8C4B92E0DB1FFF971102A5FEE4F57AC6B0
                                                                                                                                                                                          SHA-512:8E5B703C7B13C8F01E46A8B7A3854E578C8F4EB3B93192AC711B6A91B7AEE7A1E2ADEB6342FBF8A7B1604118E290C7AE53E171109CC8EE5888D66BE5E004E0B5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d...,,.W.........." .........................................................0............`.........................................`...L............ ...................)..............T............................................................................rdata..H...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):13704
                                                                                                                                                                                          Entropy (8bit):7.140940824298609
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:dVrW1hWCU8JIYiaHZ8ZpHzGovRyVYEcHg:dVuMYiQZiRPRUY/Hg
                                                                                                                                                                                          MD5:C22FA18DD5CF90246805B9D28340CB18
                                                                                                                                                                                          SHA1:6739E1717549232B16DBC3697F83CAC090B6A947
                                                                                                                                                                                          SHA-256:79C233C7D14921E62CF3E6871B3333B200186F4E87DD6B18AF2D52D99F0C41E8
                                                                                                                                                                                          SHA-512:DAA3F3D054F7BFF729A2D528F396D5AE28428B0D89FB6DB03620FEE90E5D5A1FF591128DDE4345C4224B40C0D49FA4C728D3EC000B71F9B8B11FFED5E88DEA91
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d...4.F>.........." .........................................................0......V.....`.........................................`................ ...................)..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):13704
                                                                                                                                                                                          Entropy (8bit):7.051613253693369
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:hW1hWGLUSwv7s8jtGBIYiYF8oDbnPZ2oEhZnpHzGoj6gSyIzP:hW1hWGLU8JIYiaHZ8ZpHzGovSyIz
                                                                                                                                                                                          MD5:2B8A68165EA83830AF5B198F9687A38E
                                                                                                                                                                                          SHA1:581B8BF3148A1B282317B82BC0353EF7A614A740
                                                                                                                                                                                          SHA-256:B3E8DAE1CF5F214331C98FE77A136C4C7039476014DE885D967A82348D7B384D
                                                                                                                                                                                          SHA-512:3F8E3F33A5FFD684383F90281244532F8B1748CCBACDB5598C59CE0B5519ED47273CCE111E3E452E92DED9F6EB3E719EF1D99C62EB63817F05FA16D570CAFBF3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d.....QN.........." .........................................................0.......)....`.........................................`...`............ ...................)..............T............................................................................rdata..`...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):14216
                                                                                                                                                                                          Entropy (8bit):7.000926619154885
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:wZlgW1hWcjUSwv7s8jtGBIYiYF8oDbnPZ2oEhZnpHzGoj6gaytaW9sUbmB:mlgW1hWsU8JIYiaHZ8ZpHzGovaylscg
                                                                                                                                                                                          MD5:994E1C72C7E65F5B26A51B4327D8557D
                                                                                                                                                                                          SHA1:BF180A8F8D33EE4B6DEC303895713A9E48AB7D46
                                                                                                                                                                                          SHA-256:F04E7451C5ECFCF24C2ADAF5360E12E67434BF555FB494B5B1149129A10E1C49
                                                                                                                                                                                          SHA-512:6F674D64E490135CD47AD62DC37308D41F09C721C495A0FD4C412C71554CBC8CCF5F563DA2C7E45B125DA5264047CFDCBDE200A1490414F40D9D4C319CE7B55F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d...T.*..........." .........................................................0............`.........................................`................ ...................)..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):13704
                                                                                                                                                                                          Entropy (8bit):7.0650184339069275
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:uW1hWPUSwv7s8jtGBIYiYF8oDbnPZ2oEhZnpHzGoj6gFyOLsifTi:uW1hWPU8JIYiaHZ8ZpHzGovFyOsifu
                                                                                                                                                                                          MD5:2F58DFADE485C9D9AD532FFD9C808D70
                                                                                                                                                                                          SHA1:811012773228983C20FF2A177E65F0524B47FBC3
                                                                                                                                                                                          SHA-256:9E736E7E8BCAA032BE85D8E34FF7B1842482DD8A0CD71733CB6F0B0DA3998C88
                                                                                                                                                                                          SHA-512:E996E200AFA1A552CF94C4A0139CFD50DDDE750A8DA805457666D693E75680BC0818CAE0D1ED166BD182867CE7BBA6B431E003B0C3F4F2B18881D13B9B6D0877
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d...3Qb..........." .........................................................0.......D....`.........................................`................ ...................)..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):14728
                                                                                                                                                                                          Entropy (8bit):6.996958347049253
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:BvuBL3BYW1hWFU8JIYiaHZ8ZpHzGovCyxgCGK+YP7:4BL3BTpYiQZiRPC6gGF7
                                                                                                                                                                                          MD5:8B09EF33C0D59573EB1D20A6A69252FC
                                                                                                                                                                                          SHA1:4A7249D1788D4CBBD3780E1770B6E79CF981DA2F
                                                                                                                                                                                          SHA-256:158ABC85AC5CB95BC236B2FD694CD6BFDFD929A74F94053C500BA3F5D453B398
                                                                                                                                                                                          SHA-512:74DC4AB5C29421F6497B55F4286BA382CCB160B95A23BFA9A377ABB4EFBA9E01192F660B3600800BF8BFF692C36DB6F2EA06CDBF7E2AC35B2242D814F459B026
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d...:............." .........................................................0......H.....`.........................................`................ ...................)..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):16264
                                                                                                                                                                                          Entropy (8bit):7.028533663238205
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:IOMw3zdp3bwjGjue9/0jCRrndb6kW1hWbU8JIYiaHZ8ZpHzGov4yyUX0:IOMwBprwjGjue9/0jCRrndb0rYiQZiRi
                                                                                                                                                                                          MD5:5F7C66B604B6A32211061E8BD0AF510A
                                                                                                                                                                                          SHA1:AE3332CD84507BF1692ED48CF43DB92C66BBDB53
                                                                                                                                                                                          SHA-256:E3C79834522F032216B391B2DB002A2031257636BB330E50B493AAFC08D5CC94
                                                                                                                                                                                          SHA-512:594026A726D4CD71A98C1888025DACAC9531285D2D999AE1B5FA021F03E9F67FCB322B7E2AD75E0FA5C5DE2B3EF047310EC719156BE39D5DE2C64036B6894BE0
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d.....=X.........." .........................................................0......2^....`.........................................`................ ...................)..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):14216
                                                                                                                                                                                          Entropy (8bit):7.0376020314091505
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:w8W1hWcUSwv7s8jtGBIYiYF8oDbnPZ2oEhZnpHzGoj6gytyrHuYkK:w8W1hWcU8JIYiaHZ8ZpHzGov2yqY9
                                                                                                                                                                                          MD5:50D5F48B3FE6B12775B9932A9F0FFF7B
                                                                                                                                                                                          SHA1:7B18D7A65D2E36238FD83E54AA1DC1EC70FF20F8
                                                                                                                                                                                          SHA-256:6CD148E8CADD1ABBFA22B3E351772968C9DF67C16D4230A793514643F34606D0
                                                                                                                                                                                          SHA-512:5B0ABCC5CD77E2011B6B2A7F07DC482E10BB439CDA87EAA81977875659D819663CF3A2E86354D637E08C2C7B8AFBAFE0BEC0E5839DD2FD285D5C7BD8788F4D74
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d....`Z.........." .........................................................0............`.........................................`...l............ ...................)..............T............................................................................rdata..l...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):13704
                                                                                                                                                                                          Entropy (8bit):7.134951281039627
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:pKW1hWoOUSwv7s8jtGBIYiYF8oDbnPZ2oEhZnpHzGoj6gfy5hPfVS0:gW1hWoOU8JIYiaHZ8ZpHzGovfyvdS0
                                                                                                                                                                                          MD5:D3249127863AF2A0E9B09FC614AC6E3C
                                                                                                                                                                                          SHA1:1C52E657E8E69764C012B57DF169F09FDD2FB0E5
                                                                                                                                                                                          SHA-256:DE708B4330EB30AF059901E5BA49D7BB346371D8735CD20DD2E3F9BC263849BC
                                                                                                                                                                                          SHA-512:DBC6FF75291A63F01AB6C212D9FCF4BDDCE88C554B2D972B095E87179AA9E5103E26DA2A5C2A6C40CFE14F2B1A4603FC2D98234077D9957136A2C08597AA0341
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d...h..&.........." .........................................................0...........`.........................................`................ ...................)..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):14728
                                                                                                                                                                                          Entropy (8bit):7.006516167093582
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:MnW1hWTUSwv7s8jtGBIYiYF8oDbnPZ2oEhZnpHzGoj6g7yyps:MnW1hWTU8JIYiaHZ8ZpHzGov7yy6
                                                                                                                                                                                          MD5:0F46FC5A6826842B69187F5C99C896F9
                                                                                                                                                                                          SHA1:4B54DAC54AAB1805EF07E77DC13AFF5721FFAD5B
                                                                                                                                                                                          SHA-256:5DBBE150E47866D1DF1D4A700CD0ABE801F67299AC70A083B2AFA80B459B196D
                                                                                                                                                                                          SHA-512:4FEBCD9ED0CDC836F177B591B1E752D3AF66E94402B5A575666634DB0F25144DB4DF0543823B6F4ED5B2D39E3BFE6EEA5D0B141A531CD42927260E01A6999BE3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d...+;P..........." .........................................................0............`.........................................`...H............ ...................)..............T............................................................................rdata..T...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):15752
                                                                                                                                                                                          Entropy (8bit):7.037909164477493
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:2WXk1JzNcKSIXW1hWNU8JIYiaHZ8ZpHzGovaymxtdo:2bcKSbxYiQZiRParxt2
                                                                                                                                                                                          MD5:FBC0FF6C3FC85259450094B71481499F
                                                                                                                                                                                          SHA1:BDA109EEA1215C6DC43D9FFEF49B06B661157D3A
                                                                                                                                                                                          SHA-256:04F58D750B336463B959B73D3CF5099C3EDF458F60669661FBF4E8652060D5E8
                                                                                                                                                                                          SHA-512:754E0DDC570627B0AF16A4AEF7C1E18C848DEA0E13E62D81825842A435871955F7B7C2D44101BBB2436EE90CD16601EF9600E294BBC7A5E8958F8CAC3EF39F21
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d...m..c.........." .........................................................0.......u....`.........................................`................ ...................)..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):14216
                                                                                                                                                                                          Entropy (8bit):7.065031461794049
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:wtgDfIeFrW1hWgU8JIYiaHZ8ZpHzGovIyk+/B:wpeFuGYiQZiRPI1E
                                                                                                                                                                                          MD5:1E63CFD1F17AF722BCB71E9E21E5234C
                                                                                                                                                                                          SHA1:A48988087242B2694FD2B72D539D25751B4E08EB
                                                                                                                                                                                          SHA-256:22B3EDC6413A32C93DAD8F643FF1C48DAB0822E89370090DD23EFAD8F24EB869
                                                                                                                                                                                          SHA-512:D66DF5F2FDD51B0305CEE7859CA704BFD4E32F9BE4C20C3896C5ADE3D7257936EDA8695EA465C1DC2ADD9F158D0C070397986313ADA7A1E18378DCE9AD28448A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d................." .........................................................0.......d....`.........................................`................ ...................)..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):13192
                                                                                                                                                                                          Entropy (8bit):7.177756474088336
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:A5yW1hWKU8JIYiaHZ8ZpHzGov6yM4QlEz:WwYiQZiRP6y
                                                                                                                                                                                          MD5:AC289D19647A7232623AEC9FC86B4C16
                                                                                                                                                                                          SHA1:28F3C62D2640A71B9A4876D7FD5916B53F717DCE
                                                                                                                                                                                          SHA-256:3EC53D2A45F1CBA5A11BE3F7F80A8B219533E57F28E53C0CC3F3BD82A20727E1
                                                                                                                                                                                          SHA-512:268C5828F0BAEE78B4AD62E2C71AD39A8ABC93BB6705F4F8094000A77A344E28791E4F1CA742079BB24300BB98092F2FE37D5C629EEB6C13626F70022FCC7954
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d...kl^w.........." .........................................................0............`.........................................`................ ...................)..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):14216
                                                                                                                                                                                          Entropy (8bit):7.011194345039811
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:YGeVWW1hWhU8JIYiaHZ8ZpHzGovfy8aDYt:YGeVtdYiQZiRPfv62
                                                                                                                                                                                          MD5:2F3A9EBF615987C41A51E445928B28DC
                                                                                                                                                                                          SHA1:FD19CCA9CED29B71327CB382428BBB44452E6C46
                                                                                                                                                                                          SHA-256:185E690FFA8CACC3A6DB9B54FF3F71B0B9118B93AF420A9FB5B8718D325EF17B
                                                                                                                                                                                          SHA-512:EFC798C05871B3EEADD1CB62392AC5B9AF29661CD330990F386CAD275C69BE85AD2067E17B7479032BB71077F1F93A28DE01C05E2FBBB880BC3C160D82141FDE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d...9..\.........." .........................................................0............`.........................................`................ ...................)..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):13704
                                                                                                                                                                                          Entropy (8bit):7.092609748664834
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:4yMvxW1hWRU8JIYiaHZ8ZpHzGovUyIxhtT:4yMvgRYiQZiRPUZT
                                                                                                                                                                                          MD5:135B5AFF9D848B1E36361934BE3BBA04
                                                                                                                                                                                          SHA1:E32B9EFB02AD007DE7391EDF7CF942D30D59AF91
                                                                                                                                                                                          SHA-256:549C5F66B0337FDFE27ED74FF54BA148CCE101B943360EEC2DA383DDA72306D0
                                                                                                                                                                                          SHA-512:78B8089EB68B835FCBF4745D88FB678F36EDF8B45A236D609F07D2014805AD1AF27CC9AE11FB19E65118ED9FD807BE32B1E3D780ECD9DAB788DF269F5CF50736
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d...c`.g.........." .........................................................0...........`.........................................`................ ...................)..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):15752
                                                                                                                                                                                          Entropy (8bit):6.962146587473067
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:ddv3V0dfpkXc0vVaRW1hWaU8JIYiaHZ8ZpHzGov8yNMJraXx:ddv3VqpkXc0vVaA0YiQZiRP8Czx
                                                                                                                                                                                          MD5:C96A688698519C38544148E4D13D94D8
                                                                                                                                                                                          SHA1:9AD7061A0DEE11418E1A64C2E44DE38708615AEE
                                                                                                                                                                                          SHA-256:2C458B248DED90546BF5009CFE7EB55E8BC7AE7032CA5AB429522A1B75CB6B31
                                                                                                                                                                                          SHA-512:421EBA3BE005AA16B8F1C6CFC7D20AA59F67054F06E58457AD0255A196FE09D6FF592CCFEC4B60263C8FE354DDE51C3A1BB1E9EDB7B6EAFB1F84CA4EC8871A33
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d................." .........................................................0......0.....`.........................................`...X............ ...................)..............T............................................................................rdata..X...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):14216
                                                                                                                                                                                          Entropy (8bit):7.107726547243746
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:+tZ3mW1hW1U8JIYiaHZ8ZpHzGovxyga//q:2ZYiQZiRPxIq
                                                                                                                                                                                          MD5:8FFF743F4C30572473FE842398BE4474
                                                                                                                                                                                          SHA1:72CC155722C85795C539DE47E13EF6B3D32B1D95
                                                                                                                                                                                          SHA-256:A4DBF0E38E5DD8F06727AF0BEE67623BDA9C2C5CF8F45CF1BE6178CD6554882C
                                                                                                                                                                                          SHA-512:03D83F8264871343ED4B090E33E0190942116B07CE69355E8181A1D0F3F8797393CCF74AC84A290ED99CE8A12E166F4A285214DE85BD28F21A4C3799965265E2
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d......&.........." .........................................................0......._....`.........................................`...x............ ...................)..............T............................................................................rdata..x...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):14728
                                                                                                                                                                                          Entropy (8bit):7.012801159920132
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:lZXW1hWNU8JIYiaHZ8ZpHzGovJyz0Thvy:lZi5YiQZiRPJs0Y
                                                                                                                                                                                          MD5:87B68A6BA3A1A4EF43A27040D834D3F1
                                                                                                                                                                                          SHA1:F9BD9F36FB218E9A9D62CEFDDCD01CAE34502C05
                                                                                                                                                                                          SHA-256:3479A1D4932C3AFED9B6B77A3E88F27CE38A49F66172E607F316D1BC4CE7A360
                                                                                                                                                                                          SHA-512:51B78370FFC52C109574739060F220FCECE5B4FEA0D5447A8D3B42C7374D7B15470DB5838D0EB7DBC8B77219E8698B0A593B7933ACD3D83B8BC309870882FAAE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d...B............." .........................................................0.......R....`.........................................`...H............ ...................)..............T............................................................................rdata..H...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):14216
                                                                                                                                                                                          Entropy (8bit):7.10112350462146
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:BW1hWiUSwv7s8jtGBIYiYF8oDbnPZ2oEhZnpHzGoj6gNiy90uJkw:BW1hWiU8JIYiaHZ8ZpHzGovgy/kw
                                                                                                                                                                                          MD5:AE3F200E55D7F5A61854443E0E8995B9
                                                                                                                                                                                          SHA1:08626C2F5116BC16880AC3A8CD5D2E84CE740111
                                                                                                                                                                                          SHA-256:847888F015DA853DDED5E9E4F8146DAC1C78DC88CFFCD23A4EEDDB3A1B491638
                                                                                                                                                                                          SHA-512:38E701B3A2FD545B2ACCF0C28A720F7CD72055C9C5649FB7494F4A12A39A54727CC2FC9DEE0A1155E47C48EA21E73F86E703B2DFFF1F532CA89903237F289A42
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d...)3............" .........................................................0...........`.........................................`...H............ ...................)..............T............................................................................rdata..H...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):13704
                                                                                                                                                                                          Entropy (8bit):7.036048435858172
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:PVGW1hW8U8JIYiaHZ8ZpHzGov7ywQzlvW:3GYiQZiRP7og
                                                                                                                                                                                          MD5:A5C7477D611FF768662E059241280CF9
                                                                                                                                                                                          SHA1:EB6D39FF1C5A93B004B2E7DF483CC67881102F7F
                                                                                                                                                                                          SHA-256:B32F97D2CC81A4C4777B3E03292ACAB7255BBB30CDE02CE4C736DA8B4ACB280B
                                                                                                                                                                                          SHA-512:5C5429713C802202B5D2600C61A709BE2808BC8C9AB919906E72E55BB22E702BE3CEE280FE89F71039E25CEE986B03597504ACABAB42BC29BBB7C5A6670D0F12
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d....8d..........." .........................................................0............`.........................................`...<............ ...................)..............T............................................................................rdata..8...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):14728
                                                                                                                                                                                          Entropy (8bit):7.0363735101978095
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:41W1hW2USwv7s8jtGBIYiYF8oDbnPZ2oEhZnpHzGoj6gLB0yvQX2UWY:41W1hW2U8JIYiaHZ8ZpHzGovLuyvU26
                                                                                                                                                                                          MD5:C6EFF5B7A31808B1BE936045F48D8E0B
                                                                                                                                                                                          SHA1:956EA6C821D560E03673770031890475600C7DEE
                                                                                                                                                                                          SHA-256:8C20A573A84C2ECCAEE9889ABDA373A1DB031B9DAE8B7F9B28518548ACA9FDA6
                                                                                                                                                                                          SHA-512:DEBE73025248D0A025855754C0F8ED34E9EA413DD94419003676E364CC0505B6D4A16DE701DFA5F0B1E6B81D34BD8CDAB62F795376B2AA7FFEAA1FED026CCD7C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d....G.#.........." .........................................................0............`.......................................................... ...................)..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):17800
                                                                                                                                                                                          Entropy (8bit):6.81731415895787
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:+pdkKBcyhW1hWKUSwv7s8jtGBIYiYF8oDbnPZ2oEhZnpHzGoj6geynDBl:CuyhW1hWKU8JIYiaHZ8ZpHzGoveynDBl
                                                                                                                                                                                          MD5:A3447AE32A4D0C71AC94B6C6BAC2BD55
                                                                                                                                                                                          SHA1:06BA3A178167299934A250F7F74E7D357D25331D
                                                                                                                                                                                          SHA-256:0C635ED0ABF37D43602ACE072A87FEA6519231EAEFA8E9A24F067A7DFC5DEA6B
                                                                                                                                                                                          SHA-512:9647D9C4EB1EC65B625B127D141165BAD0AD3AFD6A91D200B7FC5AC1967AADC110D69B10147E13F75E5F6859C99D05AFCD9CED9B0C4A12C51C32522EA18B4548
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d.....(j.........." .........................................................@............`..........................................................0...................)..............T............................................................................rdata..............................@..@.rsrc........0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):14216
                                                                                                                                                                                          Entropy (8bit):7.00809608647225
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:VfW1hWuU8JIYiaHZ8ZpHzGov+yYVm+2uv:VqQYiQZiRP+NEuv
                                                                                                                                                                                          MD5:A58A65F02D72AFADE693028E4807A5DB
                                                                                                                                                                                          SHA1:26160B95CFC956916C52E07DC02199E71CCD54F2
                                                                                                                                                                                          SHA-256:D424CA63B4056F5B9B2AF24AC3F0BA879593066A6610488929F8537821956E2C
                                                                                                                                                                                          SHA-512:9939E1CC1DE75BC480D6B3E4880B97D269FF98EB7A33F823DFC04B8ADECB7B307D8372265F81DCED62427EFED06116D1EE48EEE6C85A152466A21EF4CFFDFB43
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d................" .........................................................0............`............................................."............ ...................)..............T............................................................................rdata..2...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):15752
                                                                                                                                                                                          Entropy (8bit):7.020425781813846
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:kq6nWm5CZW1hWeU8JIYiaHZ8ZpHzGov8yJOVX:Z6nWm5CIkYiQZiRP8zX
                                                                                                                                                                                          MD5:941389E57DAC26901A7976FC2639A0D0
                                                                                                                                                                                          SHA1:D8F9E87982DFFFD866F9F31FDB8D61B8EEED2659
                                                                                                                                                                                          SHA-256:6B0DD2D15EAE4DA98F7520C2F0404D0D18F0841637A496D245D43E4F6E806E76
                                                                                                                                                                                          SHA-512:2894A084FA4B3F52E036AB5F4AC377B2BAA7B2A2A87638B0CE225867E4FEB695D171A8AC7D1672A5DB997F369813AB457EA3CF7294C6B0852E6955A4DCB0FD00
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d...#..j.........." .........................................................0............`.......................................................... ...................)..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):14728
                                                                                                                                                                                          Entropy (8bit):6.9833185160189695
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:tY3eBW1hWRU8JIYiaHZ8ZpHzGovbyAZ3+LZw:RQFYiQZiRPbXZ3aZw
                                                                                                                                                                                          MD5:1ECF009C6EF3D4D13F8FE51700272657
                                                                                                                                                                                          SHA1:54C339B245877CB9CF212280D925F9479E3FC6D9
                                                                                                                                                                                          SHA-256:F54521C4CFB3126852EFE9C561C19A23937F4D7B52F2DCFD6952437EDE46276C
                                                                                                                                                                                          SHA-512:BADFAE93CEB6A745C9079006185595F458FF8C33F9E3227732D929B068D585761ED1BDBAAEC0622B8D2998E3C3F6540EDADB582A840663210AEE15C1F0C5467C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d.....#..........." .........................................................0......./....`.......................................................... ...................)..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):14216
                                                                                                                                                                                          Entropy (8bit):7.097257070411098
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:WW1hW1USwv7s8jtGBIYiYF8oDbnPZ2oEhZnpHzGoj6gHVyMSGS:WW1hW1U8JIYiaHZ8ZpHzGovHVy5GS
                                                                                                                                                                                          MD5:B4047A7CF0502B07B1FACE9CDEE41C1B
                                                                                                                                                                                          SHA1:B300202D4AE9C840A6CA04F7F921CFFF8D856A4C
                                                                                                                                                                                          SHA-256:3F7DB4F39A1CD1D6A17FAFBAA3A107323484537AE44EC0A5CBCAADFB4294C0A6
                                                                                                                                                                                          SHA-512:C8041616463AE8203600A2FE134F9C4F8BE13303A9EA69B82AC23418D8C27592D4D3D3634CE9BA099B5AEE6BB94E6645B7A1CC6798E0C03EE24E050ED3B4B592
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d................" .........................................................0......R.....`.............................................e............ ...................)..............T............................................................................rdata..u...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):22920
                                                                                                                                                                                          Entropy (8bit):6.545550872382145
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:PQUbM4Oe59Ckb1hgmLNW1hWfU8JIYiaHZ8ZpHzGov+yEJAinC:PRMq59Bb1jEXYiQZiRP+pc
                                                                                                                                                                                          MD5:A83CC929787286D9381ADF902432917B
                                                                                                                                                                                          SHA1:7A10C6F073F86E9A43BBC2F53F3FDB1C1C8DF651
                                                                                                                                                                                          SHA-256:1045B3E8A160FB0C39FDDCB4944C2A0399100FCA31DCCDCA0F982DE4E187BC7D
                                                                                                                                                                                          SHA-512:B34BB8F3E47C8D26369A7EE472FC9515789461EFE5971EB3FE7076D4049782664BB48112F55D5BDED0695D5275D3D15F33662D9869E058CD561F97DB366B8A59
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d...+H............" .........,...............................................P...........`..............................................%...........@...............0...)..............T............................................................................rdata...&.......(..................@..@.rsrc........@.......,..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):14728
                                                                                                                                                                                          Entropy (8bit):6.9990394018113555
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:RKwW1hWRU8JIYiaHZ8ZpHzGovCPykm2fV:09YiQZiRPCPyo
                                                                                                                                                                                          MD5:84B4F22ADC9F3DB611A50907DCD065BC
                                                                                                                                                                                          SHA1:579A627DC8FBC62A027B2CEA3146D5F715C353BF
                                                                                                                                                                                          SHA-256:39C58BC45201CBF20D1DE6321E135A160D3D47EB31FC028E6BDDCBA5CBE2D8FA
                                                                                                                                                                                          SHA-512:95AA4ECACD9F413CCBB73E1EE2E943218EB11478D8FA7A8F470EF8C116FF011B187E2208DFEF7CD41D3CF09693D57BD0C4FFEA80BC4B6AB3DBABE61D7E1AAD21
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d...*j............" .........................................................0......V.....`.............................................x............ ...................)..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):18312
                                                                                                                                                                                          Entropy (8bit):6.821039922629443
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:etYr7zW1hWgU8JIYiaHZ8ZpHzGovPySLa:emr7WqYiQZiRPPI
                                                                                                                                                                                          MD5:807FE8B83B0D6D07A05BE0325115BE75
                                                                                                                                                                                          SHA1:515A156C10D1E424412A0E4FE170DE63B8C79509
                                                                                                                                                                                          SHA-256:AFF4F75AE7114F31ABB44452B7CF832A6722C4DA703F4AFBCC38A8EF4396E3B1
                                                                                                                                                                                          SHA-512:AE071C2E696A695FD6BA5C6B7BFEB0EDDA562CCF5CA513D212A436A8451EEB492CB945226CE8B44E1A9BFEE6FB192D35631B0F05EE784B5A977C9F0696607313
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d....V.4.........." .........................................................@............`.............................................4............0...................)..............T............................................................................rdata..D...........................@..@.rsrc........0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):19848
                                                                                                                                                                                          Entropy (8bit):6.754783824452349
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:0ZpFVhHW1hWJU8JIYiaHZ8ZpHzGovDy3cbg9ONcfe:ooBYiQZiRPD0cbUONcfe
                                                                                                                                                                                          MD5:0A128458CE5739AFCCA2EE5D82ECE01B
                                                                                                                                                                                          SHA1:20147997EA7DA8DB8B6354BB9E8E5C386F8786E4
                                                                                                                                                                                          SHA-256:36BE884EB3B2C9D6A98E5EE161F564649B58E3345748BDF893D03358C3BF1929
                                                                                                                                                                                          SHA-512:9B768F7BA46845CF0F6EF239D43B7D9D076F6BD5E8FA9A2D9F0FB025ADC4704682596AFCA0EDF406BE655B7C009839D34FB147E3FC7F68BCC197DC75471F777D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d....Z?..........." ......... ...............................................@......nv....`.............................................a............0...............$...)..............T............................................................................rdata..a...........................@..@.rsrc........0....... ..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):19848
                                                                                                                                                                                          Entropy (8bit):6.736611707961221
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:ziFMx0C5yguNvZ5VQgx3SbwA7yMVIkFGlbW1hWeU8JIYiaHZ8ZpHzGov3yNV:z6S5yguNvZ5VQgx3SbwA71IkFhYYiQZp
                                                                                                                                                                                          MD5:BA0B9A7EB6B74A3843854096EF158CE0
                                                                                                                                                                                          SHA1:142D00A16E7626F96D5EE10EF5EE9D69ECA36BC7
                                                                                                                                                                                          SHA-256:2218F8BD85DAA6F05F53679E00069EFB8716604D092D1EA3F4A00D356933FFD2
                                                                                                                                                                                          SHA-512:5AC28D0273F817E6B99CCB0DEFA81C57E6C032EA34E4E1922408D7F76C85D49CCC4CFEE7289A38AFCD4FC76597F7CD7B89CEAE787E55E11B83464E4AB11C0A5A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d...|P=z.........." ......... ...............................................@.......4....`..........................................................0...............$...)..............T............................................................................rdata..............................@..@.rsrc........0....... ..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):16264
                                                                                                                                                                                          Entropy (8bit):6.921602104074906
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:RUW1hWEU8JIYiaHZ8ZpHzGovwyetRB76P:puYiQZiRPw9B6P
                                                                                                                                                                                          MD5:9354E378D33A40EC76C22BD4173E700F
                                                                                                                                                                                          SHA1:6ED835354EC56B7EA62DE87DA64172191ABA7BF7
                                                                                                                                                                                          SHA-256:3B4973A5E5F72D0672BCBF0797D89134094FA41B06E0FCB9512BFF42494C9D0E
                                                                                                                                                                                          SHA-512:16755C22E965E2EB3B772AFD95AD5F9A4F221E6DA482428979E806DC04DD19C8033C42790218EEB970074A12B5CABF364CDFD0442356910D56394E30044F2F23
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d................" .........................................................0.......,....`.......................................................... ...................)..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):14216
                                                                                                                                                                                          Entropy (8bit):7.082226298974317
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:qfHQdurW1hW0USwv7s8jtGBIYiYF8oDbnPZ2oEhZnpHzGoj6gmybLATOD:qfVW1hW0U8JIYiaHZ8ZpHzGovmynAqD
                                                                                                                                                                                          MD5:C7043449EF4EBC858E2FDCF0639FC022
                                                                                                                                                                                          SHA1:129A50DAE6DE8B0475A032A30EE105CF3E43BFA4
                                                                                                                                                                                          SHA-256:ADB4E70F88B4B02850E6B31BBC2B016ED3642238C1544CDD1972A7924D08456F
                                                                                                                                                                                          SHA-512:3C73E4F383FD8A409A403A6134C5CE3419D5606B04B5E496AE5C5F33FE367697479DA02F807AD7AC25D0E39FD366D9C2EB3FA1A4043C6CCF9A74002E1E22B126
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d..............." .........................................................0......,.....`.............................................^............ ...................)..............T............................................................................rdata..n...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1438582
                                                                                                                                                                                          Entropy (8bit):5.590796315026177
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24576:DQR5pATuFfR5lUKdcubgAnyPbfR30iwhldYfdPcegHHJ:DQR5pnfRmP2
                                                                                                                                                                                          MD5:5E15BD6A582668EC6B640E72B89869FD
                                                                                                                                                                                          SHA1:1EC9A6FB74ABA1C01D4C8B5D82FF87B53129FA12
                                                                                                                                                                                          SHA-256:6AC8B4E98951CF66895E35EDD790FBF22D2B836D25EDC09B177E0198D7B7F25D
                                                                                                                                                                                          SHA-512:9F1AE38CCDDAB535F84F8E873A63E1ED69F44F757022810178E3E497344D60FC40F1FCF50A2E17477716EBBBA6D2B1485FEDC7F1DF8A48F62C2279F02577A08B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:PK..........!.W*..b...b......._collections_abc.pyc............................................d.Z.d.d.l.m.Z.m.Z...d.d.l.Z...e.e.e.........................Z...e.d...............Z.d...Z...e.e...............Z.[.g.d...Z.d.Z...e...e.d.............................Z...e...e...e...........................................Z...e...e.i.................................................................Z...e...e.i.................................................................Z...e...e.i.................................................................Z...e...e.g.............................Z...e...e...e.g...........................................Z...e...e...e.d...........................................Z...e...e...e.d.d.z.............................................Z...e...e...e...........................................Z...e...e.d.............................Z ..e...e.d.............................Z!..e...e...e"..........................................Z#..e.i.......................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:MS Windows icon resource - 1 icon, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):15451
                                                                                                                                                                                          Entropy (8bit):7.921868372063763
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:yUz3SxuArOYkXUW3+TpzBJO5fxCjIacxTjcZwrvguCNpi+tOhHOw+iknIHCuKEze:yy5ZYljNdJ0JSDucer8iJWhnIiuKEQiw
                                                                                                                                                                                          MD5:887859C74473622A64C99264EA974D9C
                                                                                                                                                                                          SHA1:9ECA56E1879CBF175BE95DD1FA875225E35CDCC8
                                                                                                                                                                                          SHA-256:2C401E4860C424D85369992846F5D4A26B57D5EAACE5446098869CADE852181D
                                                                                                                                                                                          SHA-512:2DDBFCF423757EB2FD9CC015F68C987B33A08EC3EEE25B7E3592BFC2AB48574BBCE40D50A90880902131344FDCD09C53D9F3372739DDC1052A93FB9712809A27
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:............ .E<.......PNG........IHDR.............\r.f....orNT..w...;.IDATx..}.XT.6.0.00C.E..{7j.wD@....AT.kLL7&.+`;&.$&1E.Q....i...M..s.{..o.InN..Z..-#...g.f.z... .....V....aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaq.....5.L>...'00.G.................tB.=}..~.~..^PP..wBBB.......$..X..2...l.....KE@.".S.."..".S.g.............O..cz8...L.D.D.D0.,,,..;...'..b..C..`]..]...u5~.....+ x...G..._.?GJ...>..}}..n....s....#....)..F.}..ck..E..INJ`....u....~....~...W.`<...".....V......s....}..B.8......>F.Q..}.r.-..3~.,,.".......%..[Pk..~...!.....].t.. .~.^..t...]...!..,.....K.....'%PH_7A 5D./...o..{.....x{...7|..~....7..7..H.>L.,^'d..),..O.f.:..2.A.W|.'...x;.........|?.>7.G.......hmXX<R..'....B..D.............?....,.@8...1"........K..7..2E.._..O .<j6.G.q..b.G..F...U..Q+r$.7..E.q#.D...~J2......~.....>....%,,..\.B..._.j..4.7\..?.k...=".%'...O....=*E...[.|.... ...g....$..ek..E..%.x......7..............7...Z.{Q."......X".....=....`...N5..LZ.
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):5157656
                                                                                                                                                                                          Entropy (8bit):5.95816549046812
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:98304:OH+jTaoFABs2NPAE7uLcdKmj8waP31CPwDvt3uFlDC:kQ+Bs2NQcdKmj8waP1CPwDvt3uFlDC
                                                                                                                                                                                          MD5:7A6A8C2A8C379B111CDCEB66B18D687D
                                                                                                                                                                                          SHA1:F3B8A4C731FA0145F224112F91F046FDDF642794
                                                                                                                                                                                          SHA-256:8E13B53EE25825B97F191D77B51ED03966F8B435773FA3FBC36F3EB668FC569B
                                                                                                                                                                                          SHA-512:F2EF1702DF861EF55EF397AD69985D62B675D348CAB3862F6CA761F1CE3EE896F663A77D7B69B286BE64E7C69BE1215B03945781450B186FC02CFB1E4CB226B5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......./',.kFB.kFB.kFB.b>..yFB..:C.iFB..:G.gFB..:F.cFB..:A.oFB.kFC..FB. >C.`FB.;A.KFB.;F..EB.;B.jFB.;..jFB.;@.jFB.RichkFB.........................PE..d......d.........." ...#..6..&......v.........................................O......eO...`..........................................zG.0.....M.@.... N.s.....K......N../...0N......bC.8...........................0aC.@.............M..............................text...t.6.......6................. ..`.rdata........6.......6.............@..@.data....n....J..<...vJ.............@....pdata........K.......J.............@..@.idata...%....M..&....M.............@..@.00cfg..u.....N.......M.............@..@.rsrc...s.... N.......M.............@..@.reloc..S....0N.......M.............@..B................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):39696
                                                                                                                                                                                          Entropy (8bit):6.641880464695502
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:NiQfxQemQJNrPN+moyijAc5YiSyvkIPxWEqG:dfxIQvPkmoyijP7SytPxF
                                                                                                                                                                                          MD5:0F8E4992CA92BAAF54CC0B43AACCCE21
                                                                                                                                                                                          SHA1:C7300975DF267B1D6ADCBAC0AC93FD7B1AB49BD2
                                                                                                                                                                                          SHA-256:EFF52743773EB550FCC6CE3EFC37C85724502233B6B002A35496D828BD7B280A
                                                                                                                                                                                          SHA-512:6E1B223462DC124279BFCA74FD2C66FE18B368FFBCA540C84E82E0F5BCBEA0E10CC243975574FA95ACE437B9D8B03A446ED5EE0C9B1B094147CEFAF704DFE978
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........iV...8...8...8..p....8.t9...8.p9...8...9...8.t=...8.t<...8.t;...8.1t<...8.1t;...8.1t8...8.1t:...8.Rich..8.........................PE..d...Sh.c.........." ...".H...(.......L...............................................n....`......................................... l.......p..P...............P....l.../......,...@d...............................c..@............`.. ............................text....G.......H.................. ..`.rdata..h....`.......L..............@..@.data................b..............@....pdata..P............d..............@..@.reloc..,............j..............@..B................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):789784
                                                                                                                                                                                          Entropy (8bit):5.607345956416271
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6144:9jurAr6yUDGpdXh3Mr3r0oARnjmeUl4XOnZiRtw036WgfCBL5JyJ/OiFe9XbI:9MT6h3M7VxKXOrqdeOiFe9Xb
                                                                                                                                                                                          MD5:64ACB046FE68D64EE475E19F67253A3C
                                                                                                                                                                                          SHA1:D9E66C9437CE6F775189D6FDBD171635193EC4CC
                                                                                                                                                                                          SHA-256:B21309ABD3DBBB1BF8FB6AA3C250FC85D7B0D9984BF4C942D1D4421502F31A10
                                                                                                                                                                                          SHA-512:F8B583981DF528CF4F1854B94EFF6F51DD9D4BE91E6FA6329A8C4435B705457C868AE40EE030FA54BEBB646A37B547BC182C9CBF0DF9A07FEA03A18CF85C6766
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........T...T...T...].3.Z......V......V......X......\......P.....W...T...H.....e.....U...._.U.....U...RichT...................PE..d....d.........." ...#.4..........K........................................0...........`..........................................x...Q..............i.... ..|M......./......`.......8...............................@............................................text...D3.......4.................. ..`.rdata...y...P...z...8..............@..@.data....N.......H..................@....pdata..dV... ...X..................@..@.idata...c.......d...R..............@..@.00cfg..u...........................@..@.rsrc...i...........................@..@.reloc..?...........................@..B........................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PNG image data, 90 x 35, 8-bit colormap, non-interlaced
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):980
                                                                                                                                                                                          Entropy (8bit):7.437322501609382
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:axhZcaoVBGuFYt53oSLhzskT76UymBuTg:uhZcaAZYP3BGfmR
                                                                                                                                                                                          MD5:2793F077B65A9DD61119E2623A2E328A
                                                                                                                                                                                          SHA1:DCBD8B4F204E883C2E83B91C5EB288A4B5EF0331
                                                                                                                                                                                          SHA-256:45E0525715A0814F5794E901037BAD0ECC6BCBEECE0968693D46A40B8267F034
                                                                                                                                                                                          SHA-512:461C5B71629C3CEB066FC8CDB766D877B3F8B2075775AAF56BC8B09B5DE493BC7CD6BC1593EC991B6BAD6C9C95D2E0F74C7A9FFC464F9CB4D42F64AB595CAC97
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:.PNG........IHDR...Z...#.....#[.9....sRGB.........gAMA......a.....PLTE......#.1$.3......+.@s%.q%.".,...$.0k$..,.+.j#... ........"d"..+.e".............^ ..+.`!..........V...+.Z .............P..T.....o%....m%.q%.k#.p%.m$.......H.s.*..+.N.}...l$..).s%.C.ho%..).....(.A.eD.lr&.......@.f.*.+.*...);.Yt&....k#.<.Z!.,...8.X.).A.h......A.dE.jB.eD.i...0.K.).*.;.]......(.=|(.*.*.).z(.0.J...............E.r.+.,.M.....^!.>.^?._...E.qG.n...h#.r&.?.`#.0D.h@.b%.3.(.B.fD.pB.m.+....N..(.>Q.~R..P.}N.zL.wJ.sL.v+.A....c......pHYs..v...v...K4.....IDATHK.US.P.F/.E.w..-.P..(R.Hqw...w..........0=/.V.L&.%N.'..n..e........Y....P...c)#!.a..ExD$6d#*:...b..%...I...SR.)....LLI......@......,....|.W D;......FI.:..<.j.W.-/.Up.....j...F_...+......44...qD.......*IS3...).....m.lIJG.Id.nCWw..P...I-...I.@?[.008$1S...h.N.......'.S.3.s8..[../,.-...V..q..J........k..c.;.]G...zo.....'.W.Y).D.4i.V..V}.7)...r.b.j.3...U.s.T}~..../....+.=...W..s.......{......6.8q.....O....{.....IEND.B`.
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PNG image data, 75 x 35, 8-bit colormap, non-interlaced
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):408
                                                                                                                                                                                          Entropy (8bit):6.999338169393177
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:6v/7MU/fh5KulNEhruXHMs19YWDIAb4wSJg:FulNEBu8s9HIcLSJg
                                                                                                                                                                                          MD5:DA45F173E512803D47D99DE16D8A64D1
                                                                                                                                                                                          SHA1:89E9AB321A977395C89FB5C23FEAA7D579F21FC4
                                                                                                                                                                                          SHA-256:BF19D2B9F5E706541E9A62E43C0E4EC237A5D47080210377E21309D5AE5502EB
                                                                                                                                                                                          SHA-512:3DE96556BCD7209E479324D1CDEF1F7F4361EA324A585D451449ADA5C9EF74DEC20B3BBF7C72655B0E837FC8B90E50E1554088DA6E32CB1CB6B0780F11E594B3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:.PNG........IHDR...K...#......7......sRGB.........gAMA......a....WPLTE....+.>._......@.cs%.b".l$.G.lC.g_".E.js%.a!.o%....F.j.*.f".B.f.).r&.g#.d#.D.h@.b]!............pHYs..v...v..........IDATHK.....0..a.......s.v~.F.V Q.wZ{<{....f..r....."....=h*r....."..rj.T...].^..[E..`8..8?....wM.o.T.).Y......l..ME....)..]...j.\.T.w..u]o...6.O...o.Mq.?..]w....1c(..:...=h*r....."....=h*.....K`..X9......IEND.B`.
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PNG image data, 75 x 35, 8-bit colormap, non-interlaced
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):558
                                                                                                                                                                                          Entropy (8bit):7.221457239938655
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:6v/7MU//XHd1C5k2EG55RKsxRNsmw2u4nPuO+eneeee0ulKjP9:Yo5kwnAsx7w2u4Vku69
                                                                                                                                                                                          MD5:476C55D4CBA46AE1326973CEFD6D3E5C
                                                                                                                                                                                          SHA1:CFC0BDC52109AE737704A83BD3BF0AC03B98BA2B
                                                                                                                                                                                          SHA-256:63BE40294B3A16888D088FFBA418F3FC63F910A3D57B24FB99C0209BAAE37CB7
                                                                                                                                                                                          SHA-512:9D63A7B6E07DC679C5A38BFDD99FF87148135B303E27C95C2891D2C066419200AB790E75064013D42F8A1F499963251C1B910182E731DF2EEAA11100F3AAD798
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:.PNG........IHDR...K...#......7......sRGB.........gAMA......a....uPLTE....+.).*..*.*.(.*..*.*.]!.'.7]!.8.U/.DU .X .<.[V .+.>.*.Z .V .`".[!.X ..).(.9....*.Z!.6.QY!.>.^.).(.(.(.(.j2(.....pHYs..v...v..Q..k...BIDATHK...R.0..74...b. .k......!L.......=.a.: Eq...Y.......o._...w..3q.`...S&.4.....F..E.2..E.2..E.,..y....4.....X"r...".......E...R.oV...v...A..0.V...<...7]i.AW.uzW..t..O..e.6./A/...@."L....\..1.A..0..V>...:..%.ZP.)m.&..].q...(....h."L.h."L.h."L.h."L.h."L.h."LJ......TM.....]7..w....&&.x..].......i..P.....IEND.B`.
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:JSON data
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1768
                                                                                                                                                                                          Entropy (8bit):4.104804279188574
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:nwbX24yhXbbdFXo01XpBeyhXYZXB0ZXUZXY1Xv6yyhX5I6yyhXosRjsfu8X6/yo9:ynjAT9JS
                                                                                                                                                                                          MD5:1ACF00B6CBFABF921215E34B9A8432FF
                                                                                                                                                                                          SHA1:111D99978095CCE085DB18149042205FFFCB8D36
                                                                                                                                                                                          SHA-256:B41394A6837D321C2A86EADCDF1D46911C3C47685C36881D357CB301C9BFBA5F
                                                                                                                                                                                          SHA-512:090E13310609E2BC56758FE802D2DE89847BFC5D741BE1F5D44027DF626B584162E2ECC7EBB7C3FF7A03E41FBCA9C14DB66D5229989BF1CA0926A064ACD4CDA6
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:[.. {.. "name": "LeftClicker",.. "hotkey": "None",.. "slider_0": 20,.. "slider_1": 2,.. "slider_2": 2,.. "slider_3": 25,.. "checkbox_0": false,.. "dropdown_0": null.. },.. {.. "name": "RightClicker",.. "hotkey": "None",.. "slider_0": 20,.. "slider_1": 2,.. "slider_2": 2,.. "checkbox_0": false.. },.. {.. "name": "AutoSprint",.. "hotkey": "None".. },.. {.. "name": "SprintReset",.. "hotkey": "None",.. "slider_0": 0.55,.. "slider_1": 0.05,.. "slider_2": 0.03,.. "dropdown_0": null.. },.. {.. "name": "Strafing",.. "hotkey": "None",.. "slider_0": 0.55,.. "slider_1": 0.1,.. "slider_2": 0.2.. },.. {.. "name": "AntiAFK",.. "hotkey": "None",.. "slider_0": 60,.. "slider_1": 5.. },.. {.. "name": "SelfDestruct",.. "hotkey": "None"..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):67072
                                                                                                                                                                                          Entropy (8bit):5.905419806967227
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:1536:BWseNxkc7Xva0Y420G1UD+dS4QBeLmRy:BWkcbi0Y42bUD+dS44eiRy
                                                                                                                                                                                          MD5:3CBA71B6BC59C26518DC865241ADD80A
                                                                                                                                                                                          SHA1:7E9C609790B1DE110328BBBCBB4CD09B7150E5BD
                                                                                                                                                                                          SHA-256:E10B73D6E13A5AE2624630F3D8535C5091EF403DB6A00A2798F30874938EE996
                                                                                                                                                                                          SHA-512:3EF7E20E382D51D93C707BE930E12781636433650D0A2C27E109EBEBEBA1F30EA3E7B09AF985F87F67F6B9D2AC6A7A717435F94B9D1585A9EB093A83771B43F2
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......`T..$5..$5..$5..-M3..5..v@..&5..v@..(5..v@..,5..v@.. 5...k..&5..oM..55..$5...5...@..45...@..%5...@_.%5...@..%5..Rich$5..........................PE..d.....e.........." .........h..............................................@............`.........................................P...`.......@.... .......................0..(.......................................8............................................text............................... ..`.rdata..|I.......J..................@..@.data...x...........................@....pdata..............................@..@.rsrc........ ......................@..@.reloc..(....0......................@..B................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):199448
                                                                                                                                                                                          Entropy (8bit):6.374698779434704
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3072:ZKABBH4pwa0bGheNSeFPyP7pgE7xhAq36exBce56iXfVhyAJ1Ohc2gZtIsLh5Aj:ZBBHCqGheNSe9YeE7/AqV1XfPym2yk
                                                                                                                                                                                          MD5:CDCF0E74A32AD7DFEDA859A0CE4FCB20
                                                                                                                                                                                          SHA1:C72B42A59BA5D83E8D481C6F05B917871B415F25
                                                                                                                                                                                          SHA-256:91FE5B1B2DE2847946E5B3F060678971D8127DFD7D2D37603FDCD31BD5C71197
                                                                                                                                                                                          SHA-512:C26FDF57299B2C6085F1166B49BD9608D2DD8BC804034EBB03FB2BBA6337206B6018BF7F74C069493FFAE42F2E9D6337F6F7DF5306B80B63C8C3A386BCE69EA6
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C.]...3...3...3.......3...2...3...6...3...7...3...0...3...2...3.L.2...3...2.s.3...>...3...3...3......3...1...3.Rich..3.........PE..d....k.d.........." ...$..................................................... ............`.............................................P................................/..........`3..T........................... 2..@............ ...............................text............................... ..`.rdata....... ......................@..@.data...@!..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):67352
                                                                                                                                                                                          Entropy (8bit):6.145559867069682
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:ow/EsYpkVgBaz57kcDA7QKFmpz7cnzH/ks/KF61xubwmB1Cf//yhC74JFmpktJS7:P/5k8cnzeJptIsL0t7Sym1xm
                                                                                                                                                                                          MD5:0E105F62FDD1FF4157560FE38512220B
                                                                                                                                                                                          SHA1:99BD69A94B3DC99FE2C0F7BBBCD05AA0BC8CD45C
                                                                                                                                                                                          SHA-256:803BA8242B409080DF166320C05A4402AAB6DD30E31C4389871F4B68CA1AD423
                                                                                                                                                                                          SHA-512:59C0F749ED9C59EFDBCD04265B4985B1175FDD825E5A307745531ED2537397E739BC9290FDC3936CFD04F566E28BB76B878F124248B8344CF74F641C6B1101DE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........M...,e..,e..,e..Sm..,e..Se..,e..S...,e..Sg..,e.Rich.,e.........PE..d....k.d.........." ...$............................................................4.....`.........................................`...P................................/..............T............................................................................rdata..............................@..@.rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):5765912
                                                                                                                                                                                          Entropy (8bit):6.089565479797802
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:98304:BBduVia4N3NWLvJP8IjF/d/aHMMwuPQyFF+RdioiZPbwappjDq:BBduVv4N3ILvJ8M/4wZy3+RdioiZPbwl
                                                                                                                                                                                          MD5:58E01ABC9C9B5C885635180ED104FE95
                                                                                                                                                                                          SHA1:1C2F7216B125539D63BD111A7ABA615C69DEB8BA
                                                                                                                                                                                          SHA-256:DE1B95D2E951FC048C84684BC7DF4346138910544EE335B61FC8E65F360C3837
                                                                                                                                                                                          SHA-512:CD32C77191309D99AEED47699501B357B35669123F0DD70ED97C3791A009D1855AB27162DB24A4BD9E719B68EE3B0539EE6DB88E71ABB9A2D4D629F87BC2C081
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ed..Ed..Ed......Gd......Kd......Id......Md......Ad..L.{._d......Nd..Ed.. e.._...d.._...Dd.._...Dd.._...Dd..RichEd..................PE..d....k.d.........." ...$.`%..87......K........................................\.....nMX...`...........................................@......ZA......p[.......V..0....W../....[..B....).T...........................`.).@............p%..............................text...._%......`%................. ..`.rdata.......p%......d%.............@..@.data.........A..L...tA.............@....pdata...0....V..2....Q.............@..@PyRuntim......X.......S.............@....rsrc........p[......~V.............@..@.reloc...B....[..D....V.............@..B................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):134656
                                                                                                                                                                                          Entropy (8bit):5.995319660651805
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3072:luJ2G0a2fYrFceQaVK756Y/r06trRjEKQze7KN9eJKVKG6j1J:luJ2faiYrFceQaVfY/rx1eze7KbewVrk
                                                                                                                                                                                          MD5:90B786DC6795D8AD0870E290349B5B52
                                                                                                                                                                                          SHA1:592C54E67CF5D2D884339E7A8D7A21E003E6482F
                                                                                                                                                                                          SHA-256:89F2A5C6BE1E70B3D895318FDD618506B8C0E9A63B6A1A4055DFF4ABDC89F18A
                                                                                                                                                                                          SHA-512:C6E1DBF25D260C723A26C88EC027D40D47F5E28FC9EB2DBC72A88813A1D05C7F75616B31836B68B87DF45C65EEF6F3EAED2A9F9767F9E2F12C45F672C2116E72
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......#.$g..wg..wg..wn.[wk..w5..vc..w..5wf..w5..vs..w5..vo..w5..vd..ws..vf..w...ve..ws..vl..wg..w...w...vj..w...vf..w...vf..wRichg..w........PE..d......d.........." ................L........................................P............`......................................... u..`B......,....0..l.......L............@..0...`Q..T............................Q..8............................................text............................... ..`.rdata..R...........................@..@.data....-.......(..................@....pdata..L...........................@..@.rsrc...l....0......................@..@.reloc..0....@......................@..B........................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PNG image data, 90 x 35, 8-bit colormap, non-interlaced
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):830
                                                                                                                                                                                          Entropy (8bit):7.553225173432729
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:6v/7K/j1Ftcs8CXyAD/Ccpd+E49L1pd4mvixrkk5j/7GubgYHcU9lQ3d81xdkg7R:1FtcMrLCcpI9JX44k5fNgY8UPsS4g7R
                                                                                                                                                                                          MD5:0A274A2067EACC3AE6DD08AC41583421
                                                                                                                                                                                          SHA1:E9E6457978AD5222DD8C1C873DD13B46AA6C80AF
                                                                                                                                                                                          SHA-256:3C031D7C80BBA6D516DF182EDEB89D6DF304582EA584C608566D8106493F0B2A
                                                                                                                                                                                          SHA-512:5378EB10E830684F68D7C98824A7B0220C9DD6AA573ABF657D1CCB14B7BC2F0B21DFAAB7F592081F3A543EB00B782947F6ED3B374AB464E871AA64ADCC5C3699
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:.PNG........IHDR...Z...#.....#[.9....sRGB.........gAMA......a....&PLTE......J.sK.uN.zQ..R..M.y....+.)....>._...<.[?.aA.dE.j...r&.p%.D.i...b".l$.F.lC.h_".a!.d".D.l&.6.*.o%....@.ct&.;.Ym%..*.q%..*.......s%.o%....>.^... .+d#.r&.......".-w'.y'...%D.h(.8.).|(. .+f".r&.!.,\!.*.<.(.$.1@.b]!..).B.eB.f%.3-.A.).k#./.E.).,.?2.J.*.1.H5.O.*.6.P8.T.*.*.;.Z.*.B.e?.`H.oN.{..B..yZ....pHYs..v...v..........IDATHK.gS.@../.X....-..b.....P.7T.....{....Qg......{ow....4.e........A%Y..B.J....N.BC.........z....ba.>..E.`@...R.i..Ra82.j.....ap..#...Q.hT.E....a.:>..15.w....'u.J..z.J..s...,HR.N...u....z1.z...j....*.E<.e4..7W'.u...C.(K~.2..d..C........D.Fm...&..*.....g.. _..-.9.6M.|...z'..i.n..g....f..:N.:d.;.x'....c@u!...i..3rZ.rTwS...jv. ..8~......+...P....V..T..!/.[...H..=U...(.n.....3...R.x.,.B...|.im.`...R7.........IEND.B`.
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):30488
                                                                                                                                                                                          Entropy (8bit):6.586478365575897
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:dEeecReJKuHq1W57AvB0EZtIsQGQHQIYiSy1pCQvC5HAM+o/8E9VF0Ny5X3:XeUeJPHqoGDtIsQGq5YiSyvmAMxkE/3
                                                                                                                                                                                          MD5:653BDCCB7AF2AA9CCF50CB050FD3BE64
                                                                                                                                                                                          SHA1:AFE0A85425AE911694C250AB4CB1F6C3D3F2CC69
                                                                                                                                                                                          SHA-256:E24A3E7885DF9A18C29BA058C49C3ADCF59E4B58107847B98ECA365B6D94F279
                                                                                                                                                                                          SHA-512:07E841FDA7A2295380BFA05DB7A4699F18C6E639DA91D8EE2D126D4F96E4CDDAEDBD490DEB4D2A2E8E5877EDFFF877693F67A9DC487E29742943E062D7BE6277
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........t..'..'..'...'..'...&..'...&..'...&..'...&..'...&..'..'..'...&..'...&..'...&..'..c'..'...&..'Rich..'........................PE..d....k.d.........." ...$.....2......................................................;.....`..........................................@..L...,A..x....p.......`.......H.../......L....3..T............................2..@............0...............................text............................... ..`.rdata.......0......................@..@.data........P.......6..............@....pdata.......`.......8..............@..@.rsrc........p.......<..............@..@.reloc..L............F..............@..B................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1867160
                                                                                                                                                                                          Entropy (8bit):6.513719329831835
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24576:6NJSAyrJZwdI3xpXxBX4Crw9yilqy+uVUD5Wbsr+Qt682zhPlkPkGqTvI92jHBHU:6Ngjid2LD5W4ac6xdLvIkhHP4ATdeDZ
                                                                                                                                                                                          MD5:AC6CD2FB2CD91780DB186B8D6E447B7C
                                                                                                                                                                                          SHA1:B387B9B6CA5F0A2B70028AB2147789C4FE24EF7A
                                                                                                                                                                                          SHA-256:A91781FE13548B89817462B00058A75FB0B607EC8CE99D265719CED573ADE7B6
                                                                                                                                                                                          SHA-512:45B24CA07A44D8D90E5EFEDED2697A37F000B39D305FE63A67292FDD237DE3F8EFD5E85B139B5702FAA695F9F27F12F24AC497E005E2F3C24C141D7CD85305B6
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......$..v`..%`..%`..%2.$b..%..x%c..%2.$l..%2.$h..%2.$d..%i..%r..%..$a..%..$m..%`..%y..%..$..%..$a..%..z%a..%..$a..%Rich`..%........PE..d.....b.........." .....................................................................`.........................................@....`...+..T.......8............^..............P...............................p...8............................................text...H........................... ..`.rdata..............................@..@.data....#...P.......<..............@....pdata...............D..............@..@.rsrc...8............<..............@..@.reloc...............@..............@..B........................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):11423
                                                                                                                                                                                          Entropy (8bit):5.034817754935299
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:rXlm2LnoZ7k2mOEhYoKVtWD2xLsmF+MNlPQ4lJ+B0O0DgryYY/+zf7gZ:rXlm2Lng7kvF2VtWD2xLeMNT+B0O0Uro
                                                                                                                                                                                          MD5:628A1F34F7B7149303918E52114D2C3B
                                                                                                                                                                                          SHA1:DBE52586BB784940D1EEADC6A2C6985F5A0D4A80
                                                                                                                                                                                          SHA-256:C96140D154C3BDC0A13A06C8B8B7628DFCD014DF827704D1DBCB2B3B38349605
                                                                                                                                                                                          SHA-512:560F1121F25C8558335DBBBBF38A382A68619F2A28967820B56266F548BF33FC23F3D13B77B4EF2D23B8330F6B6EC0E089EB1FF3864FED3F71CA28CE0A79EFB7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# -*- tcl -*-..# ### ### ### ######### ######### #########..## Overview....# Heuristics to assemble a platform identifier from publicly available..# information. The identifier describes the platform of the currently..# running tcl shell. This is a mixture of the runtime environment and..# of build-time properties of the executable itself...#..# Examples:..# <1> A tcl shell executing on a x86_64 processor, but having a..# wordsize of 4 was compiled for the x86 environment, i.e. 32..# bit, and loaded packages have to match that, and not the..# actual cpu...#..# <2> The hp/solaris 32/64 bit builds of the core cannot be..# distinguished by looking at tcl_platform. As packages have to..# match the 32/64 information we have to look in more places. In..# this case we inspect the executable itself (magic numbers,..# i.e. fileutil::magic::filetype)...#..# The basic information used comes out of the 'os' and 'machine'..# entries of the 'tcl_platform' array. A number of general and
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:Tcl script, ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):6218
                                                                                                                                                                                          Entropy (8bit):4.843141834641668
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:PV5U+VLnNUPVvH+knNUPVUHD5ngWftN+IgMufIdqi+g0SYiCXVDjqL:Nm6MFXN5uwq51iCFD2
                                                                                                                                                                                          MD5:8ABC3029963E433D1D9865AAA7E1057B
                                                                                                                                                                                          SHA1:A88091DC98B2FD0AE3A258B59F8BE43F41F04323
                                                                                                                                                                                          SHA-256:0A6B4B109CFDFC4B40FBDEFDB2282F9B1AF3CC2F9624DD39958EEBD78781AFB2
                                                                                                                                                                                          SHA-512:D5068375615A2200DDC13EEB852B2E21B7E4AA416FB7A0E97C98B8B106D7701792C523739E8BF266D2ABE411D4298A0B5B3884CFB9DF820FD4A2B61B22F9DECF
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:..# -*- tcl -*-..# ### ### ### ######### ######### #########..## Overview....# Higher-level commands which invoke the functionality of this package..# for an arbitrary tcl shell (tclsh, wish, ...). This is required by a..# repository as while the tcl shell executing packages uses the same..# platform in general as a repository application there can be..# differences in detail (i.e. 32/64 bit builds).....# ### ### ### ######### ######### #########..## Requirements....package require platform..namespace eval ::platform::shell {}....# ### ### ### ######### ######### #########..## Implementation....# -- platform::shell::generic....proc ::platform::shell::generic {shell} {.. # Argument is the path to a tcl shell..... CHECK $shell.. LOCATE base out.... set code {}.. # Forget any pre-existing platform package, it might be in.. # conflict with this one... lappend code {package forget platform}.. # Inject our platform package.. lappend code [list source $base]..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:Tcl script, ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):35136
                                                                                                                                                                                          Entropy (8bit):4.945501767273492
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:m3xQvCzasI/rHPG2yfkZ0Kbh91iQ3Lnq5MIVYB8mbgijsPIWtw4qvUm:4xQvCzasIDHPG2yW0kJ32imXmUij6JjG
                                                                                                                                                                                          MD5:BD4FF2A1F742D9E6E699EEEE5E678AD1
                                                                                                                                                                                          SHA1:811AD83AFF80131BA73ABC546C6BD78453BF3EB9
                                                                                                                                                                                          SHA-256:6774519F179872EC5292523F2788B77B2B839E15665037E097A0D4EDDDD1C6FB
                                                                                                                                                                                          SHA-512:B77E4A68017BA57C06876B21B8110C636F9BA1DD0BA9D7A0C50096F3F6391508CF3562DD94ACEAF673113DBD336109DA958044AEFAC0AFB0F833A652E4438F43
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# msgcat.tcl --..#..#.This file defines various procedures which implement a..#.message catalog facility for Tcl programs. It should be..#.loaded with the command "package require msgcat"...#..# Copyright (c) 2010-2015 Harald Oehlmann...# Copyright (c) 1998-2000 Ajuba Solutions...# Copyright (c) 1998 Mark Harrison...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES.....package require Tcl 8.5-..# When the version number changes, be sure to update the pkgIndex.tcl file,..# and the installation directory in the Makefiles...package provide msgcat 1.6.1....namespace eval msgcat {.. namespace export mc mcexists mcload mclocale mcmax mcmset mcpreferences mcset\.. mcunknown mcflset mcflmset mcloadedlocales mcforgetpackage\... mcpackageconfig mcpackagelocale.... # Records the list of locales to search.. variable Loclist {}.... # List of currently loaded locales.. variable LoadedLoc
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:Tcl script, ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):107041
                                                                                                                                                                                          Entropy (8bit):4.838727837954522
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3072:7zsUYg6sali4N8uBPS5PP9AlGXJL/RiBh:74UDqli4N8uBPS5PP9AYXJL/RiBh
                                                                                                                                                                                          MD5:B65B89714DE27DC64557882FD4A9F28A
                                                                                                                                                                                          SHA1:8FD99F1AB678A9BBAE0B7BD492C6EAE6801FC4AB
                                                                                                                                                                                          SHA-256:F6931F88AE2A4E63D77EEC83E58F5944D66C7EF5F335A51064E8023E0C842971
                                                                                                                                                                                          SHA-512:BC39C99C94D870D4AFAAC1E641806E110E3CAE6A459F7B6FDB543E4D4E14FE4462B60BC77F192EEE352D48C71E6F15F3C0989D3860F8272A32186F45E86DC963
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# tcltest.tcl --..#..#.This file contains support code for the Tcl test suite. It..# defines the tcltest namespace and finds and defines the output..# directory, constraints available, output and error channels,..#.etc. used by Tcl tests. See the tcltest man page for more..#.details...#..# This design was based on the Tcl testing approach designed and..# initially implemented by Mary Ann May-Pumphrey of Sun..#.Microsystems...#..# Copyright (c) 1994-1997 Sun Microsystems, Inc...# Copyright (c) 1998-1999 Scriptics Corporation...# Copyright (c) 2000 Ajuba Solutions..# Contributions from Don Porter, NIST, 2002. (not subject to US copyright)..# All rights reserved.....package require Tcl 8.5-..;# -verbose line uses [info frame]..namespace eval tcltest {.... # When the version number changes, be sure to update the pkgIndex.tcl file,.. # and the install directory in the Makefiles. When the minor version.. # changes (new feature) be sure to update the man p
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:Tcl script, ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):115215
                                                                                                                                                                                          Entropy (8bit):4.8838770373771405
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:1536:SYY1IO/Kufhf17a6DLJuuBuzEj6aIsGc3e6YhTjn82872y4e2BxIQAIk:SbyOCufBQaLJOEjlxTYhTjn828CBevQM
                                                                                                                                                                                          MD5:02B5B1026BD2CB9C7CEFFEB7E098AD18
                                                                                                                                                                                          SHA1:729CDB4F852531A0A4BFBBBC64F11EA4E6B90A66
                                                                                                                                                                                          SHA-256:226347B0FAE4A3ED9237CE64C998C2A88B4FDD3D7F85A081B7CAB3E863FEB13D
                                                                                                                                                                                          SHA-512:805EBBF7660357AC7234CC9EAC0566BE506B7A20E59A2EE13869EF4FC2D407C6F12B705EDE5033A24D37860887C4337B660D8CEF89030AAD4AF659DA9664EB10
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# http.tcl --..#..#.Client-side HTTP for GET, POST, and HEAD commands. These routines can..#.be used in untrusted code that uses the Safesock security policy...#.These procedures use a callback interface to avoid using vwait, which..#.is not defined in the safe base...#..# See the file "license.terms" for information on usage and redistribution of..# this file, and for a DISCLAIMER OF ALL WARRANTIES.....package require Tcl 8.6-..# Keep this in sync with pkgIndex.tcl and with the install directories in..# Makefiles..package provide http 2.9.5....namespace eval http {.. # Allow resourcing to not clobber existing data.... variable http.. if {![info exists http]} {...array set http {... -accept */*... -pipeline 1... -postfresh 0... -proxyhost {}... -proxyport {}... -proxyfilter http::ProxyRequired... -repost 0... -urlencoding utf-8... -zip 1...}...# We need a useragent string of this style or various servers will...# refuse to send us compressed content
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):21523
                                                                                                                                                                                          Entropy (8bit):4.827830596623684
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:UqT9XC9VZv9QXCTxsCTHI7672ORgS0mzBvxFRTX7Xvt3wBTnFXhCUvuyqz:LT9XC9VZviXCVsCLI7JlmzBvTxvt3gTW
                                                                                                                                                                                          MD5:08EDF746B4A088CB4185C165177BD604
                                                                                                                                                                                          SHA1:395CDA114F23E513EEF4618DA39BB86D034124BF
                                                                                                                                                                                          SHA-256:517204EE436D08EFC287ABC97433C3BFFCAF42EC6592A3009B9FD3B985AD772C
                                                                                                                                                                                          SHA-512:C1727E265A6B0B54773C886A1BCE73512E799BA81A4FCEEEB84CDC33F5505A5E0984E96326A78C46BF142BC4652A80E213886F60EB54ADF92E4DFFE953C87F6B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# auto.tcl --..#..# utility procs formerly in init.tcl dealing with auto execution of commands..# and can be auto loaded themselves...#..# Copyright (c) 1991-1993 The Regents of the University of California...# Copyright (c) 1994-1998 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution of..# this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# auto_reset --..#..# Destroy all cached information for auto-loading and auto-execution, so that..# the information gets recomputed the next time it's needed. Also delete any..# commands that are listed in the auto-load index...#..# Arguments:..# None.....proc auto_reset {} {.. global auto_execs auto_index auto_path.. if {[array exists auto_index]} {...foreach cmdName [array names auto_index] {... set fqcn [namespace which $cmdName]... if {$fqcn eq ""} {....continue... }... rename $fqcn {}...}.. }.. unset -nocomplain auto_execs auto_index ::tcl::auto_oldpath.. if {
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):133439
                                                                                                                                                                                          Entropy (8bit):5.044814789288095
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3072:Cbn4IAhYvuCg9epsArAzqpSMpWzP7ejMiIAxBPqGYkPAPaZpHYM8EN4LhVLlarXL:Cbn4IM9epsArSqpSMpWzP7ejM/eBPqG3
                                                                                                                                                                                          MD5:88BB44A1364147FDD80F9FD78FBCEF61
                                                                                                                                                                                          SHA1:2C3454D2669F0CA83FECF17976D599C85B86E615
                                                                                                                                                                                          SHA-256:1947F8B188AB4AB6AA72EA68A58D2D9ADD0894FDF320F6B074EAE0F198368FB7
                                                                                                                                                                                          SHA-512:010B13E8A2D50521B5D7ADCC5F32F7CDE3F12E1053961C575D967DC6CFD368640BF45D23832E5E9C3868CDCA9FE0505698F949C5557D4169353634C94AA196B5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#----------------------------------------------------------------------..#..# clock.tcl --..#..#.This file implements the portions of the [clock] ensemble that are..#.coded in Tcl. Refer to the users' manual to see the description of..#.the [clock] command and its subcommands...#..#..#----------------------------------------------------------------------..#..# Copyright (c) 2004-2007 Kevin B. Kenny..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#..#----------------------------------------------------------------------....# We must have message catalogs that support the root locale, and we need..# access to the Registry on Windows systems.....uplevel \#0 {.. package require msgcat 1.6.. if { $::tcl_platform(platform) eq {windows} } {...if { [catch { package require registry 1.1 }] } {... namespace eval ::tcl::clock [list variable NoRegistry {}]...}.. }..}....# Put the library directory in
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1110
                                                                                                                                                                                          Entropy (8bit):2.1033474959326957
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:5c2VBUvEWVrVJ/eyN9j2iV2NdWWT0VbusV7EV7KVAMmVZyd851VFpsGkliX:5HVBUlJvRj7SOVbusZhAMiZyi77qsX
                                                                                                                                                                                          MD5:9E3A454FA480E9A99D2D5ACDAA775233
                                                                                                                                                                                          SHA1:493637BB570A5C96BB62F998BD0391FB59AFC5F0
                                                                                                                                                                                          SHA-256:FB87BF197F4F485B08EA81F7534BC07D9C3A538D022424BE11011A1FE3C413FD
                                                                                                                                                                                          SHA-512:EDFCB2BB6AB052D28D5CEBD08AD57F36D3A4CB83D557B1359B0ADE1266E24D8F3CE87B8240881396A5BA4FB45F8B74014784E8885CDB86680D98977CC0D130F0
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: ascii, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):94389
                                                                                                                                                                                          Entropy (8bit):3.3217406555698195
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:UAHU3LIkZlmXrd/uQ0ao98zgKSTEvZPHb6qRL5NpiadDp0ZBFR6YR/fd:UVduBGf94gFMT6q95GDRBfd
                                                                                                                                                                                          MD5:41A874778111CC218BD421CF9C795EC2
                                                                                                                                                                                          SHA1:80857D106F71199CE187833D38DB091A819A520C
                                                                                                                                                                                          SHA-256:AD1ED201B69855BFD353BF969DFC55576DA35A963ABF1BF7FC6D8B5142A61A61
                                                                                                                                                                                          SHA-512:4244624124F86A3EFAB4C70B115A46C8ADF02D708860FA5F327CDBFA24BC3F9EFAD0C6EE58DE96B0B6BBC4CF6D99B322BB8657129007C86D6482F41C1503AAD4
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: big5, multi-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):98634
                                                                                                                                                                                          Entropy (8bit):2.438904802083714
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:MPFOsOKqBLPf62X4lgQeLHj6RHUn0TQb8G47Ianrd28gr:MPAsknjX4OQe7aoMMarAFr
                                                                                                                                                                                          MD5:B6A7C59E6A48D91CC2DBCB2BBA7E4510
                                                                                                                                                                                          SHA1:16A9338F18202B26981F2028BEA412DD03BB0FF2
                                                                                                                                                                                          SHA-256:8924545CC92584169138AADB64683C07BBF846A57014C2E668D23B63F43F3610
                                                                                                                                                                                          SHA-512:3D644CF394A528A8699BE3679F787A4E1DAD657C04B810580A4C520F2C043471640FBE080AC46DFD3924C47A73BEE12A6AC69D291D09EB791AD0D64A73750B43
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cns11643, double-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1111
                                                                                                                                                                                          Entropy (8bit):3.3578844928761034
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:CqHVBUlJvRj7SOVbusZhAMiZyi77q8ujr4z8tjsuVO6ys2K:JMlBVnrAMiwMm8ujr4z8emTys2K
                                                                                                                                                                                          MD5:9568EDE60D3F917F1671F5A625A801C4
                                                                                                                                                                                          SHA1:4F5B3308FE7F6845B46779DECF9B395E47AC7396
                                                                                                                                                                                          SHA-256:E2991A6F7A7A4D8D3C4C97947298FD5BACB3EAA2F898CEE17F5E21A9861B9626
                                                                                                                                                                                          SHA-512:9C32BE3E25FC2211CE91F7B9AE1F9EBA20071272BE2BBBA63A8B6E3CD6543C4C32CD62C4C4D153C94F5BE212E974A61EEFD70DDC005F1688D09D9D56E8E298A8
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp1250, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..20AC0081201A0083201E2026202020210088203001602039015A0164017D0179..009020182019201C201D202220132014009821220161203A015B0165017E017A..00A002C702D8014100A4010400A600A700A800A9015E00AB00AC00AD00AE017B..00B000B102DB014200B400B500B600B700B80105015F00BB013D02DD013E017C..015400C100C2010200C40139010600C7010C00C9011800CB011A00CD00CE010E..01100143014700D300D4015000D600D70158016E00DA017000DC00DD016200DF..015500E100E2010300E40
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1111
                                                                                                                                                                                          Entropy (8bit):3.358948900439905
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:CTHVBUlJvRj7SOVbusZhAMiZyi77qpREwKsF/+++SAJlz9aRme3cJI:wMlBVnrAMiwMmpKwKm/EYnsJI
                                                                                                                                                                                          MD5:83DAF47FD1F87B7B1E9E086F14C39E5B
                                                                                                                                                                                          SHA1:77AE330512EBFEF430A02213644BD1CFCE174298
                                                                                                                                                                                          SHA-256:0AA66DFF8A7AE570FEE83A803F8F5391D9F0C9BD6311796592D9B6E8E36BE6FC
                                                                                                                                                                                          SHA-512:D7CE2F44EDFE1DA6D3E07E9A41BB08AD42430BAAFADD09FD217F4B524323A01A1F4913B640C552D38AAEBFF75B0D50ED7A813A2A57C4019311158890C0162DF9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp1251, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1111
                                                                                                                                                                                          Entropy (8bit):3.292994562910468
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:C4HVBUlJvRj7SOVbusZhAMiZyi77qdmV/rcwvGNNlkL+rSMH+tKv:rMlBVnrAMiwMmd2r/okLz0
                                                                                                                                                                                          MD5:E9117326C06FEE02C478027CB625C7D8
                                                                                                                                                                                          SHA1:2ED4092D573289925A5B71625CF43CC82B901DAF
                                                                                                                                                                                          SHA-256:741859CF238C3A63BBB20EC6ED51E46451372BB221CFFF438297D261D0561C2E
                                                                                                                                                                                          SHA-512:D0A39BC41ADC32F2F20B1A0EBAD33BF48DFA6ED5CC1D8F92700CDD431DB6C794C09D9F08BB5709B394ACF54116C3A1E060E2ABCC6B503E1501F8364D3EEBCD52
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp1252, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..20AC0081201A0192201E20262020202102C62030016020390152008D017D008F..009020182019201C201D20222013201402DC21220161203A0153009D017E0178..00A000A100A200A300A400A500A600A700A800A900AA00AB00AC00AD00AE00AF..00B000B100B200B300B400B500B600B700B800B900BA00BB00BC00BD00BE00BF..00C000C100C200C300C400C500C600C700C800C900CA00CB00CC00CD00CE00CF..00D000D100D200D300D400D500D600D700D800D900DA00DB00DC00DD00DE00DF..00E000E100E200E300E40
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1111
                                                                                                                                                                                          Entropy (8bit):3.422723556981327
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:CRHVBUlJvRj7SOVbusZhAMiZyi77qduWn4T5K9QQSqiWeIDDdn:CMlBVnrAMiwMmduWnSKyQSqiWeIVn
                                                                                                                                                                                          MD5:441B86A0DE77F25C91DF1CD4685F651D
                                                                                                                                                                                          SHA1:D1E429916BC9423F55EEC8F17941521E9FE9D32B
                                                                                                                                                                                          SHA-256:5B8D47451F847C1BDE12CACA3739CA29860553C0B6399EE990D51B26F9A69722
                                                                                                                                                                                          SHA-512:35DF342DDA4E8790C6D53762465DF8B93B49B7B7E211D7A5753078EF559C9C9383EFF7285A90FF5C0020FBB16AF380EE3C8643F4CEB1E41917E72021079D722F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp1253, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1111
                                                                                                                                                                                          Entropy (8bit):3.307590929679485
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:CWHVBUlJvRj7SOVbusZhAMiZyi77qdjrcFvGNNlkBSMH+tA/b:lMlBVnrAMiwMmdjriokgzAD
                                                                                                                                                                                          MD5:5FA9162BEC5A4DEA97B5EA2840CFB065
                                                                                                                                                                                          SHA1:F26858E3D2FB928F39CA87CBB8446AF099570CAD
                                                                                                                                                                                          SHA-256:31639CA96A4D3602D59BD012540FE179917E0561CB11A0D0B61F1B950EB76911
                                                                                                                                                                                          SHA-512:3CE7BEABBE1A0CB946149D263D3317A8B791F6D72C49DEC4621E27F50CC359D8FA3EE97C03FF05D44E47DAA59DB87F219386467614B8B3FF8CC21AB3E3BED5E6
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp1254, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..20AC0081201A0192201E20262020202102C62030016020390152008D008E008F..009020182019201C201D20222013201402DC21220161203A0153009D009E0178..00A000A100A200A300A400A500A600A700A800A900AA00AB00AC00AD00AE00AF..00B000B100B200B300B400B500B600B700B800B900BA00BB00BC00BD00BE00BF..00C000C100C200C300C400C500C600C700C800C900CA00CB00CC00CD00CE00CF..011E00D100D200D300D400D500D600D700D800D900DA00DB00DC0130015E00DF..00E000E100E200E300E40
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1111
                                                                                                                                                                                          Entropy (8bit):3.3385880810272774
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:CfHVBUlJvRj7SOVbusZhAMiZyi77qdIn2hEeGlRhv6Mw6Kcv:MMlBVnrAMiwMmdInSEdhvrj7
                                                                                                                                                                                          MD5:6DEA4179969D6C81C66C3B0F91B39769
                                                                                                                                                                                          SHA1:7E2722576BFFABC3258C5EDB2D99FA2468D6A4B0
                                                                                                                                                                                          SHA-256:47576CAE321C80E69C7F35205639680BF28010111E86E228ED191B084FAC6B91
                                                                                                                                                                                          SHA-512:91CC626B6454517F06FB3616E9ED623D1A2A4BFE74AFA9885F00F6AEC835D8825A5587091B9D9AB0E5ABDA291FA3FE7CE87E2618E21EB2974D9118AE27B8A2FF
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp1255, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1111
                                                                                                                                                                                          Entropy (8bit):3.4033510023542655
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:C0HVBUlJvRj7SOVbusZhAMiZyi77q30pPE7Lym4cwGm+AMZjyG/JQIG/Y:XMlBVnrAMiwMm30FQLym4ys6Jg/Y
                                                                                                                                                                                          MD5:D50DFAFEE5C605C5C00A25A9EEE4D4CF
                                                                                                                                                                                          SHA1:7D51BC17931D3D809716C06E7F07C6011286A144
                                                                                                                                                                                          SHA-256:29340EA8E5AD3532BF67FA77CC852F055081B1238925CB109908AA72804CCC04
                                                                                                                                                                                          SHA-512:D0A9B422A1061D6239E442767069B987E33239FCBA9BACE677923888F5F8BD1DCAABC71B83A985A0A86A15DCC44316781665BBFBF24558FCB94FDA6783285BCB
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp1256, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..20AC067E201A0192201E20262020202102C62030067920390152068606980688..06AF20182019201C201D20222013201406A921220691203A0153200C200D06BA..00A0060C00A200A300A400A500A600A700A800A906BE00AB00AC00AD00AE00AF..00B000B100B200B300B400B500B600B700B800B9061B00BB00BC00BD00BE061F..06C1062106220623062406250626062706280629062A062B062C062D062E062F..063006310632063306340635063600D7063706380639063A0640064106420643..00E0064400E2064506460
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1111
                                                                                                                                                                                          Entropy (8bit):3.344584404753015
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:CNHVBUlJvRj7SOVbusZhAMiZyi77q8uWTfNL4wIBUioGndt:uMlBVnrAMiwMm8uWJDNIt
                                                                                                                                                                                          MD5:CC3D24543FDD4644BBBD4AAB30CA71BC
                                                                                                                                                                                          SHA1:8E2658E7F782F005411BCB8423BDFC3C68BDED14
                                                                                                                                                                                          SHA-256:C15AB85438728BF2C60D72B1A66AF80E8B1CE3CF5EB08BA6421FF1B2F73ACDF4
                                                                                                                                                                                          SHA-512:5ECABF820098F7D24AB806ADD9CA3E1087C29914FB2DE6BA3DC656234202DE3FDF80A7E9ED433CCB2149FF07184F74884CEB37A1B689E9E0C1402916F3E13AFE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp1257, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1111
                                                                                                                                                                                          Entropy (8bit):3.2984943182702593
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:CKlHVBUlJvRj7SOVbusZhAMiZyi77qdIQ2jFvGNNykoxWi3/i:xMlBVnrAMiwMmdIQufkoxn3q
                                                                                                                                                                                          MD5:12BCEAE6B6A5FAE5AE9C42F5998BA485
                                                                                                                                                                                          SHA1:C9620DA0C763D2C3770386E69EE7E421BD1BA965
                                                                                                                                                                                          SHA-256:29D93DEE7C01B2264778BC6B75F6EF76EA6AC53E9F4A334D83707229E7F482D2
                                                                                                                                                                                          SHA-512:714BAF58462FB0E84A32D82C8FC2D63EDF78DF8CCE578391E2521737F94F860B5CCFE41B481E1D09879A6811FCFD8B98A2724DB1D15749BD5293A9B33BCAD071
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp1258, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1110
                                                                                                                                                                                          Entropy (8bit):3.515546664597914
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:CFyHVBUlJvRj7SOVbusZhAMiZyi77qZpuHVBIqE18wDyV8mK:wyMlBVnrAMiwMm+VhE1LmK
                                                                                                                                                                                          MD5:CE6D8A6542DC12D1783084FA4B2B63EA
                                                                                                                                                                                          SHA1:5039A350C8E3E2C6F353B438B41BD0B6A7AB8069
                                                                                                                                                                                          SHA-256:E5613C04D3D2EE44CCAD85AE53A37C257674491C540836E5D942BBCC4E4A8DB4
                                                                                                                                                                                          SHA-512:E8C5CFB747486BBE0E567B6E87B59D5246D749A80C8F64F6669227C7FD849886F98A1F94451922AC099409AC14890F1A8B1E5F25EA584FDB1522ACE3AD0BE6A6
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp437, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1110
                                                                                                                                                                                          Entropy (8bit):3.6177058818384693
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:CjHVBUlJvRj7SOVbusZhAMiZyi77qSKOQFhWehDrq18wDyVKockoiH:WMlBVnrAMiwMmSKOQFhWeh3q1odH
                                                                                                                                                                                          MD5:8EF3CBCA101F5777846D12D3C96A0A7D
                                                                                                                                                                                          SHA1:5EC5418B861894E0F18EA15AA4414019815E2EA2
                                                                                                                                                                                          SHA-256:A0415F14F5D72AD24E9C3A5C91517A0E3D22E1ADBC3505C0C6E918B961F7A07D
                                                                                                                                                                                          SHA-512:FB14C88E61E5459B4A8706751D88D0A261AC6B4171F72912D87CE78A2BC97A821CCF5B53676FB229C08F9E557BE624F4DC649B722A906B9B7944ED2D5E7F9065
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp737, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1110
                                                                                                                                                                                          Entropy (8bit):3.451057608106102
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:CsOHVBUlJvRj7SOVbusZhAMiZyi77qoo9ecL067J4ZNUPVw3PfA:AMlBVnrAMiwMm59T067KDLPo
                                                                                                                                                                                          MD5:9656761FA02EA24773EAD3E5C4BDB975
                                                                                                                                                                                          SHA1:366228F25392708FA799E9CC0830CE9917EF6CA7
                                                                                                                                                                                          SHA-256:C3C6542E902DEC2C44DDCFD8B5CB7ABF309B0413A7CED1614DC0B20CF7C5E35F
                                                                                                                                                                                          SHA-512:A6A44B9A2193D75764DC284BE53264E57BFEB2A221FD54B4577DD90752F69A45E6B9D293108A7AB895F347A24FD10AAE84954A043AB1F466F485D707D7412380
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp775, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..010600FC00E9010100E4012300E501070142011301560157012B017900C400C5..00C900E600C6014D00F6012200A2015A015B00D600DC00F800A300D800D700A4..0100012A00F3017B017C017A201D00A600A900AE00AC00BD00BC014100AB00BB..259125922593250225240104010C01180116256325512557255D012E01602510..25142534252C251C2500253C0172016A255A25542569256625602550256C017D..0105010D01190117012F01610173016B017E2518250C25882584258C25902580..00D300DF014C014300F500
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1110
                                                                                                                                                                                          Entropy (8bit):3.3718781469586827
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:C9HVBUlJvRj7SOVbusZhAMiZyi77qZpuHVBc+myS5LeQDTVwA:EMlBVnrAMiwMm+VeyS5SQn/
                                                                                                                                                                                          MD5:2169EE726DCC011E6C3505D586C88FC3
                                                                                                                                                                                          SHA1:094252AD0634787E2D7F0D28A448437054D359C7
                                                                                                                                                                                          SHA-256:13DF611F429A9B331DA1B34F3C718CCCAF0BD4AB44F71A9C632197987B4D643B
                                                                                                                                                                                          SHA-512:BC5831EF1C131095A22C76FFCB5C4217081AF796B60455BE2DE2E2689CFE1033F07E8B45449F77E7804A7D52CBCFB916B0B4639828E65B14475BB3367F47C8EE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp850, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1110
                                                                                                                                                                                          Entropy (8bit):3.4509005787389877
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:CPHVBUlJvRj7SOVbusZhAMiZyi77q7EUsOtycwQIc+922V:mMlBVnrAMiwMmwvOtycwQIc+9R
                                                                                                                                                                                          MD5:48402B424B5101BDEEB0192BBA96DB7D
                                                                                                                                                                                          SHA1:C9EB93A37AF70F4134AA9CF05D914A30FB3201DD
                                                                                                                                                                                          SHA-256:F3A18A8C7934F6586F023477E08D3F9D5EAD9A45E9E58A3F8D018AF9BB13F868
                                                                                                                                                                                          SHA-512:4EE615605BFF3D94A7FC4FE23D8288F0F20F6792C8C69ECACABAE82F1A334D8417C5DFFC0DA3702E2DB09B7BE1E5FF19C6A0F460C9A5EC84D1856BB9C8061CA5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp852, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1110
                                                                                                                                                                                          Entropy (8bit):3.4277025591531864
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:CoHVBUlJvRj7SOVbusZhAMiZyi77qLHVWjwk/rMZC032SLnD2JbD:hMlBVnrAMiwMmx8whM03VLDy
                                                                                                                                                                                          MD5:8B8AA56F83BA750EB73FAE542E76FF1A
                                                                                                                                                                                          SHA1:2F3C3BA4B854A7D6B0A3D27BC519EE66A042E05A
                                                                                                                                                                                          SHA-256:E64FD2E639DA6F654D9BFBB2266F9432259A6A55941622F5CDDC3797E382EB0A
                                                                                                                                                                                          SHA-512:8B4061176663F7AC01B3969D25F680B5870A8EAD864CFAD897F18E75409CE721E6CC367A88EBABAF72E77D4542EE1894F2A6EE47A43FB3D4C650CFA18DFD3D71
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp855, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0452040204530403045104010454040404550405045604060457040704580408..04590409045A040A045B040B045C040C045E040E045F040F044E042E044A042A..0430041004310411044604260434041404350415044404240433041300AB00BB..259125922593250225240445042504380418256325512557255D043904192510..25142534252C251C2500253C043A041A255A25542569256625602550256C00A4..043B041B043C041C043D041D043E041E043F2518250C25882584041F044F2580..042F044004200441042104
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1110
                                                                                                                                                                                          Entropy (8bit):3.364496856690505
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:CaHVBUlJvRj7SOVbusZhAMiZyi77qZpu6uUV5Dw5LeBCVHjzA:jMlBVnrAMiwMmyUVFw5SYdI
                                                                                                                                                                                          MD5:BA52A031DE1B1A6ED1C41BED8946750C
                                                                                                                                                                                          SHA1:BD54C0E2F62FD36675892A61FD8B340A56845D20
                                                                                                                                                                                          SHA-256:B6CD5C6F2B54D89142679D599ED0A5DEE6955A3B3F6B6673E46AFE7A5A303CDC
                                                                                                                                                                                          SHA-512:5F915AABE39F31CE9337B4B9B0239DF8ADA898D2D9F111DD09D97689DB89CF45B093AC187FC28484CFB213D14B0D8F58C5668D0A59726282D6F52D5D24697816
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp857, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1110
                                                                                                                                                                                          Entropy (8bit):3.506813480871637
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:CMHVBUlJvRj7SOVbusZhAMiZyi77qij4Axlt49Y18wDyV8mK:VMlBVnrAMiwMm/g+9Y1LmK
                                                                                                                                                                                          MD5:C416471B57FB894DC45D30C31B4BD2E2
                                                                                                                                                                                          SHA1:BA378F8122280992AE51245A06814D8155564220
                                                                                                                                                                                          SHA-256:804EFA345C5BBBAD2449C318A7A3F5B31F4234712AAD23DC49B3FB5AA33B7A57
                                                                                                                                                                                          SHA-512:E7CDE706CFE573525C2DE319AD5783AE9D97C4F6D28B14A77A729F281540B0DAFAD4C14879EF76473BFDEBC38499C65CA228470983F2D1BC31938A91A2486522
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp860, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1110
                                                                                                                                                                                          Entropy (8bit):3.5174672833207183
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:ClHVBUlJvRj7SOVbusZhAMiZyi77qZpORVPnA2Gm18wDyV8mK:8MlBVnrAMiwMmiVPAA1LmK
                                                                                                                                                                                          MD5:4997979FD1692063E2B9AA9870E0BE4C
                                                                                                                                                                                          SHA1:919012354B99BBEF4C85517E89A2C9CD340FCE49
                                                                                                                                                                                          SHA-256:4B7E76AEB75289FACA76434EA6E9874E9504AD2BC3D8D47550EADBCC8294857E
                                                                                                                                                                                          SHA-512:C122A1AE2DE79CB97E5989535B7478A76D905CDE60B01F80F5B84EDB9DF08BE6829E1811AF19608971DA048B8DA24F40DE0217A8054AC612EC2D8B3560500FBE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp861, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1110
                                                                                                                                                                                          Entropy (8bit):3.5573268031592717
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:CdMHVBUlJvRj7SOVbusZhAMiZyi77q36AqE18wDyV8mK:iMMlBVnrAMiwMmq3E1LmK
                                                                                                                                                                                          MD5:9B4D1B95B20BD67555517DCC3007B22A
                                                                                                                                                                                          SHA1:2C0D6121DB49CDAB6FBAA81398BE2E44BE4E1110
                                                                                                                                                                                          SHA-256:6C15CB256B1C22170292589C6F589E64E164EB36EC7E84F0BD48149BABB7C5FC
                                                                                                                                                                                          SHA-512:34C3E401364D579E8AC7A4E1F1F7A29A84C62E1D5146D7664832639EA3997227DC4BAF1B64DC605E6574D680E61B55D0C69C329E35B1BEC41501FC68C5B634B7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp862, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..05D005D105D205D305D405D505D605D705D805D905DA05DB05DC05DD05DE05DF..05E005E105E205E305E405E505E605E705E805E905EA00A200A300A520A70192..00E100ED00F300FA00F100D100AA00BA00BF231000AC00BD00BC00A100AB00BB..259125922593250225242561256225562555256325512557255D255C255B2510..25142534252C251C2500253C255E255F255A25542569256625602550256C2567..2568256425652559255825522553256B256A2518250C25882584258C25902580..03B100DF039303C003A303
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1110
                                                                                                                                                                                          Entropy (8bit):3.518080906819747
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:CXHVBUlJvRj7SOVbusZhAMiZyi77qwGuXVFq5EC18wDyV8mK:eMlBVnrAMiwMmw3VFu1LmK
                                                                                                                                                                                          MD5:C93CCDF65F7F349F22855745660F02AE
                                                                                                                                                                                          SHA1:604888B1FB3C57DF47277CDD1153597BA89E8C36
                                                                                                                                                                                          SHA-256:232D6FE34D7151920232EAAE9C515F36400AB64136DCC5B802D6245AC6F5D56B
                                                                                                                                                                                          SHA-512:D5B65AE7353F694A37AF29177BF1A95477918FC5A002C2FE199624BD5B391698807BAECF54225BC40F62B3CA7912C7066A4AAF01B9E3E399133831CAA342BF4F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp863, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1110
                                                                                                                                                                                          Entropy (8bit):3.72017408907567
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:CwHVBUlJvRj7YOVbusZhAMiZyi77qcHj92OibcDQAyUjSG:5MlrVnrAMiwMmSsNcDQvcSG
                                                                                                                                                                                          MD5:146E0D1779D50E070E0EF875E8374DF8
                                                                                                                                                                                          SHA1:B51E5598712598BC387DD79AE80BD879F139140D
                                                                                                                                                                                          SHA-256:81BEBFD9A61E9F17495763B68D57742FAB2A1A43871015699A2C8E5FDED4EC19
                                                                                                                                                                                          SHA-512:1F0DAD8E77712C5A018894332BE72FF5C546C92F481421CCB8553AD6F1E9A18617765C8CEE4187265CCCB1AB073E221289D34C9AB1F0501231D52C81FC1C932B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp864, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..00200021002200230024066A0026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..00B000B72219221A259225002502253C2524252C251C25342510250C25142518..03B2221E03C600B100BD00BC224800AB00BBFEF7FEF8009B009CFEFBFEFC009F..00A000ADFE8200A300A4FE8400000000FE8EFE8FFE95FE99060CFE9DFEA1FEA5..0660066106620663066406650666066706680669FED1061BFEB1FEB5FEB9061F..00A2FE80FE81FE83FE85FECAFE8BFE8DFE91FE93FE97FE9BFE9FFEA3FEA7FEA9..FEABFEADFEAFFEB3FEB7FEBBFEBFFEC1FEC5FECBFECF00A600AC00F700D7FEC9..0640FED3FED7FEDBFEDFFE
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1110
                                                                                                                                                                                          Entropy (8bit):3.5193842128126676
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:CsKHVBUlJvRj7SOVbusZhAMiZyi77qZpuHVBnAFj18wDyV8mK:gMlBVnrAMiwMm+VRAFj1LmK
                                                                                                                                                                                          MD5:150B2E00B3F84F8075F3653ED7A4C8E0
                                                                                                                                                                                          SHA1:7131DC656EFE1F2277B19DA72F0EEB46B4EC54A0
                                                                                                                                                                                          SHA-256:ADA1A52064EE93EBE6F8A5D101D01F8776038E12F21A5CA1C006EE833577C705
                                                                                                                                                                                          SHA-512:AC56EEB0220826BF8FF6CA52768DB63961AAC46095A2F3EEBA11B5973CC92AF52DFBBE9E85A0DD04CAB8998212FA2599EDD83BAAA7FB2D394E330FF2F7C015DB
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp865, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1110
                                                                                                                                                                                          Entropy (8bit):3.5038992968715266
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:CCHVBUlJvRj7SOVbusZhAMiZyi77qb+SAJlz9aRme3cB18wDyVNZkR:bMlBVnrAMiwMm8YnsB1wZy
                                                                                                                                                                                          MD5:FC33B5F773E87696A69E8798446E9772
                                                                                                                                                                                          SHA1:4FC5589C1DD88BB8171758BC173A63B3A5687AE5
                                                                                                                                                                                          SHA-256:32A45DEBA933C7ED99141535087A4C99BA79802175E3F762ACA6EB941157F85A
                                                                                                                                                                                          SHA-512:332D2FEC532192F58F792441E61D675A8692C36BECF768D07F64B8C31561CC1A2DF402625A4719E758A9B59DE4228FFE9F94F067E7DC0D82F9DA2D6500E50304
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp866, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0410041104120413041404150416041704180419041A041B041C041D041E041F..0420042104220423042404250426042704280429042A042B042C042D042E042F..0430043104320433043404350436043704380439043A043B043C043D043E043F..259125922593250225242561256225562555256325512557255D255C255B2510..25142534252C251C2500253C255E255F255A25542569256625602550256C2567..2568256425652559255825522553256B256A2518250C25882584258C25902580..0440044104420443044404
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1110
                                                                                                                                                                                          Entropy (8bit):3.5261138894265507
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:CtHVBUlJvRj7SOVbusZhAMiZyi77qii+lh2o5+hdVMQFhWgCDrKE:EMlBVnrAMiwMmXY2o5+hdVMQFhWf3f
                                                                                                                                                                                          MD5:4A2C66AA630D4AE2BF1E7546DCE2DAE5
                                                                                                                                                                                          SHA1:FABB672957D21CA2B4E0EACA5FCE6093BAACF77A
                                                                                                                                                                                          SHA-256:AFE6ED6EB5D07C45B6B928A48BC5EF57EFCF61602D36FF9FBDE4A8EA3FA6DF75
                                                                                                                                                                                          SHA-512:A548002EB7AF8735DBBBCC9883B44B326F261C02A3C7CE65C373755DD92212A66740112EAE0FC556CAD5B86911709C6DF12167DC5B6AD1E01C6F1EB5AB16DB37
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp869, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0080008100820083008400850386008700B700AC00A620182019038820150389..038A03AA038C00930094038E03AB00A9038F00B200B303AC00A303AD03AE03AF..03CA039003CC03CD039103920393039403950396039700BD0398039900AB00BB..25912592259325022524039A039B039C039D256325512557255D039E039F2510..25142534252C251C2500253C03A003A1255A25542569256625602550256C03A3..03A403A503A603A703A803A903B103B203B32518250C2588258403B403B52580..03B603B703B803B903BA03
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1110
                                                                                                                                                                                          Entropy (8bit):3.33737382140564
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:CSyHVBUlJvRj7SOVbusZhAMiZyi77qVQEHmEU4AyqU+TWwdd:CMlBVnrAMiwMmWr4AyqUSd
                                                                                                                                                                                          MD5:FC8C876B4738236FC71A1AF96E4566D0
                                                                                                                                                                                          SHA1:DDFDC3F62D99A6BD705CF0719B50F66449C8808A
                                                                                                                                                                                          SHA-256:4F05F31CA026BBFEEEE49ED86504CB060784137A9CFAE0E5954D276E837AB5DE
                                                                                                                                                                                          SHA-512:5BF58A810E029840825FFF3318E90415E6F2B7E46032FD428B4971923D41A64C127A6F438E4894E80EC9604CD34F1D47B4F9A02ABAB3E7D6351611811DC1F2B9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp874, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):49008
                                                                                                                                                                                          Entropy (8bit):3.5144574650895364
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:R/RPrUHiJrKWkyY/W2wHiwWnwWOORY+gutSY83+JRS:RVUidzJCurDGSYvW
                                                                                                                                                                                          MD5:EF4508C84A025095B183E6BAD67B1ECD
                                                                                                                                                                                          SHA1:D12D5381D50D578AA8687671DC542C462A7F490D
                                                                                                                                                                                          SHA-256:6D1B512110BEAF2CD1296AC878F51D567848AB4A1CED4F18C72806BB136B3D23
                                                                                                                                                                                          SHA-512:E695E7E6F4A11D5E8D62982E26B69B87DB2F1F3D6B6DCCD5F1DF51879F5C4533265CBD7B785E1F2652D8CA3FC913D4F862E7575F67C636314A6E6956FD96E023
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp932, multi-byte..M..003F 0 46..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0080000000000000000000850086000000000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..0000FF61FF62FF63FF64FF65FF66FF67FF68FF69FF6AFF6BFF6CFF6DFF6EFF6F..FF70FF71FF72FF73FF74FF75FF76FF77FF78FF79FF7AFF7BFF7CFF7DFF7EFF7F..FF80FF81FF82FF83FF84FF85FF86FF87FF88FF89FF8AFF8BFF8CFF8DFF8EFF8F..FF90FF91FF92FF93FF94FF95FF96FF97FF98FF99FF9AFF9BFF9CFF9DFF9EFF9F..0000000000000000000000
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):134671
                                                                                                                                                                                          Entropy (8bit):3.5217328918779645
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:1536:+CwDua7D90Jz1aDJmnMfEGniOQdH6prJs3inqlW6/t9Qwf+zCt5:j1WVRpe3rpt9hf+Gt5
                                                                                                                                                                                          MD5:CF9CFD6329A4FB6C402052B9417DAC3A
                                                                                                                                                                                          SHA1:75CE13FE1E5898D47B67F951C0C228851F1CC04D
                                                                                                                                                                                          SHA-256:B6EC2BE0504CA62B9D1B6857F6BAA13FFAC5A567D4432F4EAB98ADC830F5D9C3
                                                                                                                                                                                          SHA-512:7E19607EEA5342ECFE92D56DAAE82827DE147AE5AFDA8E9D67FD0970F528902CDE20A8A07CF2F341B926E59BB4FF792872976F1C7C5CD351959A71A8B6A1924A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp936, multi-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):132551
                                                                                                                                                                                          Entropy (8bit):3.100976362851161
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:1536:2UO8ecy5KnSMsDlOmNpkQ4oQHnTApv+ngLbiyEY:2U/etc/sBRZp//r
                                                                                                                                                                                          MD5:03E19A4DE3490A7DC50D04EC1F558835
                                                                                                                                                                                          SHA1:9DFECAE08C98109EAA358F5920AED647888F722B
                                                                                                                                                                                          SHA-256:477F8B79B67F4A22C963EE65B9B387DBD8E4B8F62D800B0A51D2276580C6ADBB
                                                                                                                                                                                          SHA-512:7D6AD30AF75A3AA6332A860C6ABF87BF725EB6B4AF3B37699043A10EF3235471C63D0ECB4D437D5AD9438DF5DA646EB55117A9BB8B55EF6868F71E49035C18B7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp949, multi-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):93330
                                                                                                                                                                                          Entropy (8bit):3.319807723045599
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:aAHU3LIkZlmXrd/uQ0ao98ggKSTEvZPHb6qRL5NpiadDp0ZBFR6YR/fW:aVduBGf9PgFMT6q95GDRBfW
                                                                                                                                                                                          MD5:1D84B025DAB127F2073947D764D307B6
                                                                                                                                                                                          SHA1:4E3D3CBD96D084836F1FE6F2AA497E3FAA463B9B
                                                                                                                                                                                          SHA-256:F80E05533D1A1494C32F9412E9AD2D9C11FAF9AE0668A6F9D1FA5CEEDC6870E2
                                                                                                                                                                                          SHA-512:188D649F9717F20524AFF47F85C3B23AEC3E7825BF54975285D06C17587D581DC24A3F6A7CAB1703DE7AD5521FE2FE2572DE627A81E6A48049A47BB219ED4AF8
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: cp950, multi-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1113
                                                                                                                                                                                          Entropy (8bit):3.7780987266961663
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:vJMHkUlJvRjmf9RCsUBOdXsCbbNviANpk3m1XFAoE4xSF5HrBPkdn:vKvlA9RCs6CXrViAN51XFA9eSvdPKn
                                                                                                                                                                                          MD5:90FE0C57BBC6C2D8A3324DEB7FD45F3D
                                                                                                                                                                                          SHA1:06B95BE43E4C859A0F1B01384EDD26500C6C1F9E
                                                                                                                                                                                          SHA-256:EB9B262E4D179268E6F017C0D4EF0E7034E31A5B4893595D150640CA1F6A1C45
                                                                                                                                                                                          SHA-512:6A5E67D9F3EC6046C42793E1437B8A6E50EBD72D8EC67FEFEB6DAD6FAB6A5B5C74F939363587D5A6529E217AF54FB8A9CF0F768E114DD931C57887451CACE56E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: dingbats, single-byte..S..003F 1 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..00202701270227032704260E2706270727082709261B261E270C270D270E270F..2710271127122713271427152716271727182719271A271B271C271D271E271F..2720272127222723272427252726272726052729272A272B272C272D272E272F..2730273127322733273427352736273727382739273A273B273C273D273E273F..2740274127422743274427452746274727482749274A274B25CF274D25A0274F..27502751275225B225BC25C6275625D727582759275A275B275C275D275E007F..0080008100820083008400850086008700880089008A008B008C008D008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..0000276127622763276427652766276726632666266526602460246124622463..2464246524662467246824692776277727782779277A277B277C277D277E277F..2780278127822783278427852786278727882789278A278B278C278D278E278F..2790279127922793279421922194219527982799279A279B279C279D279E279F..27A027A127A227A327A
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1073
                                                                                                                                                                                          Entropy (8bit):3.0039861897954805
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:XXBcIhJZDgEoQkNCGz0Jyh9lZk3Vmd2QhZLXPiALV3d:dTcNCJEhfZk3Vzox/iqVN
                                                                                                                                                                                          MD5:F7B3771D43BDE6AFF897683BED2FE6AD
                                                                                                                                                                                          SHA1:E70C2C0902413536CB6163752D70F3AE4AF6A967
                                                                                                                                                                                          SHA-256:165BE658AB7D61FFC3DF1E2F1438C2F9FCEE6808A756316302157F44E6D3ACD7
                                                                                                                                                                                          SHA-512:F87DC718EB2DD95237B144FDA090BB636121B9479E492AC94E4F7EBDD88171F070B9E9F6165BDA7B7E2BA2A3E6188B1108D8F91AA5F142CCCFDAD317628DD941
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):86971
                                                                                                                                                                                          Entropy (8bit):2.3925661740847697
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:UHivP+bFFScXEBFhHeUrUFESCeYjN7GC0nYX:I7FFX2nHeUr8ESCDlX
                                                                                                                                                                                          MD5:C5AA0D11439E0F7682DAE39445F5DAB4
                                                                                                                                                                                          SHA1:73A6D55B894E89A7D4CB1CD3CCFF82665C303D5C
                                                                                                                                                                                          SHA-256:1700AF47DC012A48CEC89CF1DFAE6D1D0D2F40ED731EFF6CA55296A055A11C00
                                                                                                                                                                                          SHA-512:EEE6058BD214C59BCC11E6DE7265DA2721C119CC9261CFD755A98E270FF74D2D73E3E711AA01A0E3414C46D82E291EF0DF2AD6C65CA477C888426D5A1D2A3BC5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: euc-cn, multi-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):83890
                                                                                                                                                                                          Entropy (8bit):2.350315390677456
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:2GhX8nuQ635vlHptHzh0abNQPQA0OMS2HhFV3:2GikvRpMuNQ4P73
                                                                                                                                                                                          MD5:F2DE0AE66A4E5DD51CC64B08D3709AAB
                                                                                                                                                                                          SHA1:97558A51A6DD6C56FC7A42A4204141A5639021FD
                                                                                                                                                                                          SHA-256:A3C916BA16BCAC9FAA5A1CCC62ACA61452D581CD8BA3EE07EC39122C697274C9
                                                                                                                                                                                          SHA-512:0EAA90100527FF150D2653D7BB57647D69E592BE53B714DDD867114CFCC71E3A76882772F4FAECE040DF09FA8971D1C22DECC497E589B4CA827A6890497A48D9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: euc-jp, multi-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):95451
                                                                                                                                                                                          Entropy (8bit):2.4080588863614136
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:4/vO7UlClqAd8XfpUqv+mCoKRuLbtMjnIxz0DY:4nO4N9fpv+ngLbiyEY
                                                                                                                                                                                          MD5:103843B3A57168BD574F6CACC550D439
                                                                                                                                                                                          SHA1:982652EA2B0DCFBB55970E019A4EDFBFCFAF9C24
                                                                                                                                                                                          SHA-256:5448643398685456A11CBB93AF2321F70B8659E2FFF3CCC534B4D53BD2F38C89
                                                                                                                                                                                          SHA-512:27A8DE6F97DB4A96E5D0132692A32A99DAB8A6C98973A0C4E50A219F2D2F364E63D657E5E8478B2706CA33C45C376F55B5BFCC9459E06AEA88BFCD4F0E32525C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: euc-kr, multi-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):88033
                                                                                                                                                                                          Entropy (8bit):2.3790651802316996
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:o4Is/C+0IwpRK1CkinIKUyNiNBzxOC4T/:LIsR0/RKckiIgNiDtOxT
                                                                                                                                                                                          MD5:1A8E55DEA98B6D5EAC731ED233D3AD7C
                                                                                                                                                                                          SHA1:1335FC0FC2AAE7E7F5EC42AC17A4168368B4A64D
                                                                                                                                                                                          SHA-256:B4894AEDD2D5B5AE54B6D2840F7C89A88E9308EFD288F179E65936E172EF4B0D
                                                                                                                                                                                          SHA-512:9DDCE366BA1196EB9FB913ACFDE8516BC9BB8D51894866D2E7E8CB313DC4D6C6D33C5A9E78142E83594DC423D10DA6F8DE211E69844B939198BC7DB9AED808F0
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: gb12345, double-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1111
                                                                                                                                                                                          Entropy (8bit):3.270324851474969
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:qrmHVBUlJvRj76OVbusZhAMiZyi77qN8VmKfkiJt0RMFS:qSMlZVnrAMiwMmNPYPFS
                                                                                                                                                                                          MD5:D06664ACAA478BDEB42B63941109A4E3
                                                                                                                                                                                          SHA1:4A6196FCC1BDE988C1A23EAA69745A9979F1AEFF
                                                                                                                                                                                          SHA-256:ACD50951F81566C8D823670F9957B2479102EB5AE4CF558453E1D8436A9E31FF
                                                                                                                                                                                          SHA-512:CB51A36B851FFDB5C6F9B9D0333EEA6A14CEF3796E0A60530198C16999D64E638047E873333630360299C9126F79CEDDA2D9F169028CED1FC04B1D3C55FFFC5B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: gb1988, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..002000210022002300A500250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D203E007F..0080008100820083008400850086008700880089008A008B008C008D008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..0000FF61FF62FF63FF64FF65FF66FF67FF68FF69FF6AFF6BFF6CFF6DFF6EFF6F..FF70FF71FF72FF73FF74FF75FF76FF77FF78FF79FF7AFF7BFF7CFF7DFF7EFF7F..FF80FF81FF82FF83FF84FF85FF86FF87FF88FF89FF8AFF8BFF8CFF8DFF8EFF8F..FF90FF91FF92FF93FF94FF95FF96FF97FF98FF99FF9AFF9BFF9CFF9DFF9EFF9F..000000000000000000000
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):85912
                                                                                                                                                                                          Entropy (8bit):2.3945751552930936
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:D47/S+i8vdx3Tz+hpHcBrQqKtrebjMIGCx8jE:0c873T6DHcBrbKtrVlE
                                                                                                                                                                                          MD5:9357E05C74D6A124825F46A42B280C14
                                                                                                                                                                                          SHA1:E5106ABE12D991AFE514F41E3B9E239202A4ADFE
                                                                                                                                                                                          SHA-256:C445E4C9F676AE997D2DDA2BBC107B746F3547D85F39479951C56F46275EE355
                                                                                                                                                                                          SHA-512:B2187D70A92FB38572BA46F3C3443233BEED1A4ABBFBA1B860F4BBAE6B3D8C16B8C9F52A20DAA12B2B8B40972E52F816860427B743530177E4CF0D8BA34EF381
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: gb2312, double-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):86971
                                                                                                                                                                                          Entropy (8bit):2.3925661740847697
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:UHivP+bFFScXEBFhHeUrUFESCeYjN7GC0nYX:I7FFX2nHeUr8ESCDlX
                                                                                                                                                                                          MD5:C5AA0D11439E0F7682DAE39445F5DAB4
                                                                                                                                                                                          SHA1:73A6D55B894E89A7D4CB1CD3CCFF82665C303D5C
                                                                                                                                                                                          SHA-256:1700AF47DC012A48CEC89CF1DFAE6D1D0D2F40ED731EFF6CA55296A055A11C00
                                                                                                                                                                                          SHA-512:EEE6058BD214C59BCC11E6DE7265DA2721C119CC9261CFD755A98E270FF74D2D73E3E711AA01A0E3414C46D82E291EF0DF2AD6C65CA477C888426D5A1D2A3BC5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: euc-cn, multi-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):204
                                                                                                                                                                                          Entropy (8bit):4.949409835601965
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SOd5MNXVSVLqRIBXS4ovLE9sDXMVyXK9ow1Deq9Ts5dRPMSXcRA0kcR4X9cL+TXI:SVNFS0oyisLMsXK9okTw/BDSVKNw
                                                                                                                                                                                          MD5:D3AC33390D31705FA4486D0B455247DF
                                                                                                                                                                                          SHA1:2EE8613DC04A6FA84AB38FD5F3A2AA3FE330625B
                                                                                                                                                                                          SHA-256:98074C85650A420A095ADA9138DA3A8A0AA4027BE47EA1E97A596F319EB084E9
                                                                                                                                                                                          SHA-512:CB265B753C84968E2D1D6E706906DA9A7BB796D08F626290BCCA8F089771AFD176A9DC912773E8BA390D2AEC08592AD535C7D254E1DF92CF04848601481D4EFE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: iso2022-jp, escape-driven..E..name..iso2022-jp..init..{}..final..{}..ascii..\x1b(B..jis0201..\x1b(J..jis0208..\x1b$B..jis0208..\x1b$@..jis0212..\x1b$(D..gb2312..\x1b$A..ksc5601..\x1b$(C..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):122
                                                                                                                                                                                          Entropy (8bit):4.978693690727393
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SOd5MNXVTEXIBXS4ovLE9sDXNvdwUHEQwqc6XWxVUNOov:SVNFSoyisL/Zzc6mYNHv
                                                                                                                                                                                          MD5:057CB0AA9872AC3910184F67AC6621BC
                                                                                                                                                                                          SHA1:BBA47F9D76B6690C282724C3423BD94E2C320A04
                                                                                                                                                                                          SHA-256:234811FC8B0F8FF2B847D9CC3982F1699DF1D21A43C74DCE45BA855D22520007
                                                                                                                                                                                          SHA-512:019F187D2D16FB51BF627ACB7E67778857E56D4C160E0E5ACA6ABC05EC5FDB624CE2715CB9E0DAD73BFF9D697982BE0D539BC55BCCD368FC7C8EE0FFC04E9F61
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: iso2022-kr, escape-driven..E..name..iso2022-kr..init..\x1b$)C..final..{}..iso8859-1.\x0f..ksc5601..\x0e..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):240
                                                                                                                                                                                          Entropy (8bit):4.95909788984399
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SVNFUXoyisLNcs9ozc6W4Twk0sRBDSVKN6tWIHRy:oUYcLNcTzczbwRYRy
                                                                                                                                                                                          MD5:BB186D4BE3FA67DD3E2DEE82DD8BD628
                                                                                                                                                                                          SHA1:93CE8627038780CFFF8C06E746DD5FB2B041115C
                                                                                                                                                                                          SHA-256:741B4C842557EED2952936204D0AE9C35FA3A0F02F826D94C50C46976291797C
                                                                                                                                                                                          SHA-512:4921E7AA3DB8E33609603FE129B97275DFF80CFB06648D2068FA7950246C67B9B530B74827638F69F4DFB8F55CDD4AA952EA72EAEB6ABB527D52F20C6B46FB51
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: iso2022, escape-driven..E..name..iso2022..init..{}..final..{}..iso8859-1.\x1b(B..jis0201..\x1b(J..gb1988..\x1b(T..jis0208..\x1b$B..jis0208..\x1b$@..jis0212..\x1b$(D..gb2312..\x1b$A..ksc5601..\x1b$(C..jis0208..\x1b&@\x1b$B..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1114
                                                                                                                                                                                          Entropy (8bit):3.236046263464657
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:iyHVBUlJvRj7SOVbusZhAMiZyi77qimmvGNNlkL+rSMH+tKv:iyMlBVnrAMiwMmTmokLz0
                                                                                                                                                                                          MD5:3538A970CD098BF5CE59005FE87B6626
                                                                                                                                                                                          SHA1:285A96CC40D7CCE104FB4B407C7F0C400AA8F9CB
                                                                                                                                                                                          SHA-256:A9CB4F4CA111608F882729BC5EB1C2F15530C515EF02DD2CA62F2D8DC5A210CF
                                                                                                                                                                                          SHA-512:A6A6F2D8B5C22E240D195D168A604887062508FF3340D24E13BFCBD6C2E687347F2CFE724FA2ED12F36915B55EE2CFD901EC3F08E2B0A2FFD3BC2A98BBD12A50
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: iso8859-1, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1115
                                                                                                                                                                                          Entropy (8bit):3.319750415373386
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:jHVBUlJvRj7SOVbusZhAMiZyi77qimXG2yM6q7KytC:jMlBVnrAMiwMmTXG2gytC
                                                                                                                                                                                          MD5:CBDE40170FECD2496A9DA3CF770FAB7B
                                                                                                                                                                                          SHA1:3E1D74DF6AFEB6CDE8ECBDAC8F81F2F9C64150DE
                                                                                                                                                                                          SHA-256:48F4A239C25354F0E9F83A39F15D4632BB18A9C33E60C671C67307159917ECED
                                                                                                                                                                                          SHA-512:A26B56A4CFE29E5A0A0B3A55283A7767397693388E2DEEC342C69B6F718FAE2407EB8D5ADE538FAE6947CBB8B052943C3A52F2D046ABAC7A3DAA86D730DC293F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: iso8859-10, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0080008100820083008400850086008700880089008A008B008C008D008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..00A0010401120122012A0128013600A7013B011001600166017D00AD016A014A..00B0010501130123012B0129013700B7013C011101610167017E2015016B014B..010000C100C200C300C400C500C6012E010C00C9011800CB011600CD00CE00CF..00D00145014C00D300D400D500D6016800D8017200DA00DB00DC00DD00DE00DF..010100E100E200E30
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1115
                                                                                                                                                                                          Entropy (8bit):3.3206399689840476
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:6HVBUlJvRj7SOVbusZhAMiZyi77qimwHmEU4AyqU+TWwdd:6MlBVnrAMiwMmTf4AyqUSd
                                                                                                                                                                                          MD5:E2A0BCB83BFC3F435CDCFC20D5CF2E0C
                                                                                                                                                                                          SHA1:CFD18B5B5DB4EE46E63D912B8FD66D513C4C8D39
                                                                                                                                                                                          SHA-256:21E769C5A66E4D12D6E7DB24022E92AF1EC0D0331FE3C8C605654F239C0F3640
                                                                                                                                                                                          SHA-512:C86F9180F2F4A177F1EA10E26B0903ABEAFDDE0317C332A48F8D1BB586DAC91C68800E2E4FA2CD739C435419B106CBA4BEFC049F2BCD720E9FC2C0AE8436CFAC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: iso8859-11, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1115
                                                                                                                                                                                          Entropy (8bit):3.338879965076632
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:olHVBUlJvRj7SOVbusZhAMiZyi77qim2w4kBUioGnd2:olMlBVnrAMiwMmT/WNI2
                                                                                                                                                                                          MD5:21CEBB723D47B1450A7FB21A82470B97
                                                                                                                                                                                          SHA1:A40FD3AFE1ECE89E3F682D527D281BC563DB3892
                                                                                                                                                                                          SHA-256:3271D39D7B4DCD841E8E5D5153D1B8837718B88FEFEC73DC37D314816EEFE5E5
                                                                                                                                                                                          SHA-512:3A0E033A4D93C679215F672C6C4FE425D63E1DE157AA671E7400639165EC3EB498E4EEB030D6FB8FF8BE2FD8C986D341036A8CED9FA094D092CF2822D5DC065B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: iso8859-13, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1115
                                                                                                                                                                                          Entropy (8bit):3.3670559016263915
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:vHVBUlJvRj7SOVbusZhAMiZyi77qimhw6COlk1fKMH+tiH:vMlBVnrAMiwMmT/tlkQz0
                                                                                                                                                                                          MD5:FDAA88946DE4EB4E6D37F2B6AFCF6CAF
                                                                                                                                                                                          SHA1:56FC4773941E7457EA04EDA92C883642DE45D100
                                                                                                                                                                                          SHA-256:F0A5675027FB1CA34B4E4128D24C2968CD275890569A32A86AFA4994CE4983E0
                                                                                                                                                                                          SHA-512:92658A6FEB42A41B3CFFC377C4A9A3F6780A79FC596D3FEDBA6D3B3D75A9F40E859A2CE8DC579A278BAEEDEEFA2408E2B7853D99D5C2D14AACF63C521FE2BB86
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: iso8859-14, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1115
                                                                                                                                                                                          Entropy (8bit):3.260398494526282
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:mHVBUlJvRj7SOVbusZhAMiZyi77qimmRf4kL+rSMH+tKv:mMlBVnrAMiwMmTmCkLz0
                                                                                                                                                                                          MD5:D779D5E2A0083C616A226B2D82ABF0EB
                                                                                                                                                                                          SHA1:D1657DB5E2989EBA80BAB98A1E1217CFFFBB19DB
                                                                                                                                                                                          SHA-256:C74E8E23A0FF0D5DEA7C318CA20DC817DA4E57B0DD61B3361FC0D5098A9316FE
                                                                                                                                                                                          SHA-512:26E62BE8AE793ED3B725BF0D1BABF4D6ED63A6F3772ABD48955FC4394BDE5A47614D1FF89A21A828676BF1302F3C9361B557B0FBF0DF8561FB7E66542FE94CDC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: iso8859-15, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1115
                                                                                                                                                                                          Entropy (8bit):3.3065938185320918
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:dHVBUlJvRj7SOVbusZhAMiZyi77qim0SmmPkYTtyL:dMlBVnrAMiwMmTttPkYpyL
                                                                                                                                                                                          MD5:74FDEDDAF670023DA7751FB321E345A0
                                                                                                                                                                                          SHA1:0677FED67C1333A9A74D50642E5214701A57E2AF
                                                                                                                                                                                          SHA-256:640D977EC1D22B555C5075798DA009E3523E8F55F29BE22A3050CD1B4EF7B80E
                                                                                                                                                                                          SHA-512:AC02FD95159A856A9DDEF4E6A8216B958DC07311B553FF39403DC5B77E1AFF2A2C4C03F5F26A2BB7AD5DB6800BEE03E895554556DBBFBE89426286796ADE55AC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: iso8859-16, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1114
                                                                                                                                                                                          Entropy (8bit):3.340505173539446
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:UHVBUlJvRj7SOVbusZhAMiZyi77qim/ssm5VO6ys2K:UMlBVnrAMiwMmT/ssYTys2K
                                                                                                                                                                                          MD5:9B87850646FFE79F3C8001CBCB5BB3A1
                                                                                                                                                                                          SHA1:8F97576F3FB3B5DBEF71DC2C9314AB5E530974D6
                                                                                                                                                                                          SHA-256:76949B03F57041B07F41902BD7505AB3594D79AA8F7BDEED5F0481004B10CBC3
                                                                                                                                                                                          SHA-512:101A28AF0799E7E0A5723E5DD76D5EF0FEEF584AC479A88F499CB3B7D2AA93767D72F8E51C76F7547F08FF8DD3CBBA7FF444BD07F99A92755526E75C596109EF
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: iso8859-2, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1114
                                                                                                                                                                                          Entropy (8bit):3.2507537230559977
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:tHVBUlJvRj7SOVbusZhAMiZyi77qimw2g0kgTJMkFtoD:tMlBVnrAMiwMmTo0kgTJDoD
                                                                                                                                                                                          MD5:CBD0B9CDCD9BC3D5F2429A760CF98D2F
                                                                                                                                                                                          SHA1:6DEF0343E0357E0671002A5D2F0BFC2E00C8BCF9
                                                                                                                                                                                          SHA-256:1F51E7BDA64D466C16FEE9A120BBE3353A10CEB9DAB119FFA326779BA78D8C5D
                                                                                                                                                                                          SHA-512:88DB6D23B53F4A78133C794ED42FA3F29A4ABAD35DE4B022040FA187AA59B00664CC13F47AFF4507D72F4CB2166F026144213EE760AB0FD67CDD2FA5906F434A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: iso8859-3, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0080008100820083008400850086008700880089008A008B008C008D008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..00A0012602D800A300A40000012400A700A80130015E011E013400AD0000017B..00B0012700B200B300B400B5012500B700B80131015F011F013500BD0000017C..00C000C100C2000000C4010A010800C700C800C900CA00CB00CC00CD00CE00CF..000000D100D200D300D4012000D600D7011C00D900DA00DB00DC016C015C00DF..00E000E100E2000000
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1114
                                                                                                                                                                                          Entropy (8bit):3.3413832766873073
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:KHVBUlJvRj7SOVbusZhAMiZyi77qimX4AsD/njR7Ky8hA:KMlBVnrAMiwMmTXBs3EyuA
                                                                                                                                                                                          MD5:8B620EDECAC2DF15A024C2CE15FB64A5
                                                                                                                                                                                          SHA1:65C5EE5D08964E37393E6A78ABA0DB16D51240E2
                                                                                                                                                                                          SHA-256:66B3CF994F0B5E0103D13E812958320AFB555C91E3F81B579D4CBF231E6A0805
                                                                                                                                                                                          SHA-512:93391325405D3AEA0A913F5EA8EA0391920D10F234C26AB1DA70992702889A3AF7B85E11A1FCA554690942B238CE313DD460798E59C5B1F4069036E7B0F24F44
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: iso8859-4, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1114
                                                                                                                                                                                          Entropy (8bit):3.342721205983665
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:zHVBUlJvRj7SOVbusZhAMiZyi77qimq5+SAJlz9aRme3cJbx:zMlBVnrAMiwMmTqeYnsJbx
                                                                                                                                                                                          MD5:6FBEFDC3DEC612B7B2CC903D8C53F45B
                                                                                                                                                                                          SHA1:14EC3C166DC411149C32C262DBE8E327F6186669
                                                                                                                                                                                          SHA-256:3130BF26DA0C840C1E02203A90C3B1C38966FB203130E2FBB3DD7CB3865A3539
                                                                                                                                                                                          SHA-512:F3F15AD8B6C9D9B4C9C994FE3235B4463E59BE7DCE79CF3F7AA77905D6F4DC2C4AABB79B440767DB13D357B13F09EA34983FCA7BC92D0AFA15FB6CBEDDD04E38
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: iso8859-5, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1114
                                                                                                                                                                                          Entropy (8bit):2.992219341429816
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:YHVBUlJvRj7SOVbusZhAMiZyi77qimEZjyG/KE:YMlBVnrAMiwMmTEs6KE
                                                                                                                                                                                          MD5:52F025D943A45EE840D9C3DFD06E4D79
                                                                                                                                                                                          SHA1:571EA14B49FA6150BFD2ABA79E52799955D9FA10
                                                                                                                                                                                          SHA-256:CB71909BF01A3A7A4C7396359DA06D206B58A42AD68192CE37169D6640D46E13
                                                                                                                                                                                          SHA-512:77FF9DC785A63CA59A7D58BB25C7D2C16F364E525F9B939177385EF80F7DE37734C8774F1BC829CF0270FD66257A4D31689654C8037DB0A86A0291FFDE637B90
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: iso8859-6, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0080008100820083008400850086008700880089008A008B008C008D008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..00A000000000000000A40000000000000000000000000000060C00AD00000000..00000000000000000000000000000000000000000000061B000000000000061F..0000062106220623062406250626062706280629062A062B062C062D062E062F..0630063106320633063406350636063706380639063A00000000000000000000..064006410642064306
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1114
                                                                                                                                                                                          Entropy (8bit):3.393893260854861
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:TMyHVBUlJvRj7SOVbusZhAMiZyi77qim2OBHK9QQSqiWeIDDdn:TlMlBVnrAMiwMmT1hKyQSqiWeIVn
                                                                                                                                                                                          MD5:4BFB0A35D971A9D4C5EA8D8099E93C37
                                                                                                                                                                                          SHA1:8FED2CBB1343E5B4442748242B5F89A76110592D
                                                                                                                                                                                          SHA-256:76F6BC85FC9CB89BC3F94D36275AB23C740BA17FD36EC8907479DA3A885415EA
                                                                                                                                                                                          SHA-512:C9CE1E9EA57A1DEF62BBC60A115C06325C6EE8F92021695459E1ADAF1193A559BC5F0229191BFC2E344296DC137583ED4A9A61A65890F99F4CF97B3864C7AF0F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: iso8859-7, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0080008100820083008400850086008700880089008A008B008C008D008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..00A02018201900A320AC20AF00A600A700A800A9037A00AB00AC00AD00002015..00B000B100B200B303840385038600B703880389038A00BB038C00BD038E038F..0390039103920393039403950396039703980399039A039B039C039D039E039F..03A003A1000003A303A403A503A603A703A803A903AA03AB03AC03AD03AE03AF..03B003B103B203B303
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1114
                                                                                                                                                                                          Entropy (8bit):3.0494739426493567
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:uHVBUlJvRj7SOVbusZhAMiZyi77qimieGlnvs26Kcv:uMlBVnrAMiwMmTirv87
                                                                                                                                                                                          MD5:5F69EAF54E7A1E8AC81C9E734DBE90D8
                                                                                                                                                                                          SHA1:BA509C88A4FC03922EF5CDC887FAA7B594A9BC5A
                                                                                                                                                                                          SHA-256:865E3665743B5FABA3E1AD6AA55515A666BD05DA6266879D9B66C98905DAFF3C
                                                                                                                                                                                          SHA-512:D9924FBE59CB571AF721CA602DBE58CAD0D9310610EDF544F8FC0FBF3D1CE4E99597D0198E4E7C802107012786346FE4C1B9C6C3A76D5F60B9A83981B0EDA24D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: iso8859-8, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1114
                                                                                                                                                                                          Entropy (8bit):3.2591070910715714
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:XHVBUlJvRj7SOVbusZhAMiZyi77qimmvGNNlkBSMH+tA/b:XMlBVnrAMiwMmTmokgzAD
                                                                                                                                                                                          MD5:0B99E605E73B7D8DEFD8D643F5729748
                                                                                                                                                                                          SHA1:F30E7CCBCD9C539126E8D6CA0886E4B2BD54E05D
                                                                                                                                                                                          SHA-256:CF51E867DDE2F19553D98FEEC45A075C4B4F480FB1EDADB3D8DAD1EBEA9299F3
                                                                                                                                                                                          SHA-512:DA0487CD7F2143195E80697C17FFDB61AFD464C888DDF84813B2B5D1BAB24D96466DA7A7F77C8E4A9D0D53F34D72928923380AFC1B92A96C0A3BFF46006A4E19
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: iso8859-9, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1112
                                                                                                                                                                                          Entropy (8bit):3.2708615484795676
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:zBHVBUlJvRj7SOVbusZhAMiZyi77qN8VmKfkiJt0RMFS:zBMlBVnrAMiwMmNPYPFS
                                                                                                                                                                                          MD5:4E21F24F8D9CC5DF16B29CACD997AC69
                                                                                                                                                                                          SHA1:064E723EFB82EF1C303E5267496304288821E404
                                                                                                                                                                                          SHA-256:61B14A7C312366F79BB45F02C6B7EE362E6F51CBAD5E479E563C7F7E785DB654
                                                                                                                                                                                          SHA-512:AF8FAEB47EFB51F2537139F7C4254ABED119E477FD2B5E83B90B7A903B43C4E02DDF43A7DDB044A0A9601E9F9ADE91B02EE7C0EC87FF5DDCF9951B9601A90435
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: jis0201, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D203E007F..0080008100820083008400850086008700880089008A008B008C008D008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..0000FF61FF62FF63FF64FF65FF66FF67FF68FF69FF6AFF6BFF6CFF6DFF6EFF6F..FF70FF71FF72FF73FF74FF75FF76FF77FF78FF79FF7AFF7BFF7CFF7DFF7EFF7F..FF80FF81FF82FF83FF84FF85FF86FF87FF88FF89FF8AFF8BFF8CFF8DFF8EFF8F..FF90FF91FF92FF93FF94FF95FF96FF97FF98FF99FF9AFF9BFF9CFF9DFF9EFF9F..00000000000000000000
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):81772
                                                                                                                                                                                          Entropy (8bit):2.3571626869060776
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:AigXM6CwL/9pV7Hl6+Yko9gZxErA3/MS/8xqg8:AZ/tp1Hl2KZxUfr8
                                                                                                                                                                                          MD5:F0661E22C7455994AA1F6EC1EDA401B4
                                                                                                                                                                                          SHA1:928B2AC46A9FDE61A81F56BE225E6138B40C22E5
                                                                                                                                                                                          SHA-256:F6B1C6AC5F5FC4E990A7A1AAC16A406012040936431BEFE7D2B6CD1DA9E422C4
                                                                                                                                                                                          SHA-512:917CC58678A9E9F5CBE860D30828846ABA4EA8CDFAB7DD1AE6A66C47ECBB85CF67DD97BC3E6F95341DD30F4E757B2CEA571708D5B4CED18A29F19904C3138AE0
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: jis0208, double-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):72133
                                                                                                                                                                                          Entropy (8bit):2.3455261548208055
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:9F/D7CH2puD5CdzU3nAkP5dHn7s391fmOarFaVQ:H/D7CHbozU3nAk3H7sXm3FgQ
                                                                                                                                                                                          MD5:07CE2C135BE17DBAFA558AA5949A53DB
                                                                                                                                                                                          SHA1:5D9DBEFCCB44E76C1A4E61360C6FCED8DCC8EF4D
                                                                                                                                                                                          SHA-256:785CFC5F5D9CB06DB8061730AB0016A0F70D0B59F6787D2A3CBB8D5779C99706
                                                                                                                                                                                          SHA-512:E954D7198D58ACEDEB4C8E5F466107767C3DA43763A5F6CDDFCF567226F9B22B4C2DE27564F28CD125D7F1BA7CB9C6DE6DEC4065EC2676572C793BE458FDDD9D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: jis0212, double-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1111
                                                                                                                                                                                          Entropy (8bit):3.531149521168141
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:KcJ5mHVBUlJvRj7SOVbusZhAMiZyi77qpSzIa9qVRS3YcEchJh3MAxSl:KmmMlBVnrAMiwMmAzIxVgBE6cAxQ
                                                                                                                                                                                          MD5:96F54CC639ACA8E466FB8058144C9350
                                                                                                                                                                                          SHA1:0B9530D6080F2BAACABD5AA0D48BFF316FCCEF64
                                                                                                                                                                                          SHA-256:0E43244BFC4F33FACB844B9E00270A1A4C24DC59B8A9B95104E2D788BB2F59FD
                                                                                                                                                                                          SHA-512:5B7859325E5E34C9D4558B1198795BB9C6A8EF783EB97193EA80BA76C38AFE9BDD1B526B77401DF5456B7A0E85E942191FFD4B4F2B9F0C8168A7093EE452802E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: koi8-r, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1111
                                                                                                                                                                                          Entropy (8bit):3.5076564572101714
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:K+HVBUlJvRj7SOVbusZhAMiZyi77qpSzIaU3dmVRS3YcEchJh3MAxSl:K+MlBVnrAMiwMmAzI/EVgBE6cAxQ
                                                                                                                                                                                          MD5:4B755EF2288DFC4009759F8935479D68
                                                                                                                                                                                          SHA1:C3BDF0D9DF316DE8919DAA4329275C5AA81D61B4
                                                                                                                                                                                          SHA-256:ED04D5B977B8C8944D8760B713FF061292DA5634BCBB67CDFB1C3A6FF5378C81
                                                                                                                                                                                          SHA-512:3F1E1CC47327054FB9C54157ED10514230F10BFCD4BD9FDAFA02D7B238137DC7442CA2661B0739D8EEA3181E187D3B639A2C8118A0DE272C96000908121B6CFB
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: koi8-u, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):94393
                                                                                                                                                                                          Entropy (8bit):2.4104200953565513
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:XbjO7Uw6uKdosXRxps9a+ut/BmZPwkpT9A0T03o:XfO4ZBRxpV+4wPwKloo
                                                                                                                                                                                          MD5:366C09E4A4CC10006E593F5B3F3461D7
                                                                                                                                                                                          SHA1:A0DABFBEEB66E26FB342844EA41772D7A1D19C24
                                                                                                                                                                                          SHA-256:9B27FE7E7054F36E279993F19E52E18AC03360D117AE80C42B4E984A97C590AA
                                                                                                                                                                                          SHA-512:670F32D698C7992038E736D3AD40098D8589C0C5A1379E32A0F02A02FAF251B1312CAD131DDADC3F80B23A3821A91689F2E310309028BDDDF227D532EB505A20
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: ksc5601, double-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1116
                                                                                                                                                                                          Entropy (8bit):3.4295694929963667
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:8jHVBUlJvRj7SOVbusZhAMiZyi77qHVPJSf2FcVDu1LEe4qPPMl2J89:8jMlBVnrAMiwMmHEmJ4IMgi9
                                                                                                                                                                                          MD5:10850BCFB943318284D6191494EBD7D5
                                                                                                                                                                                          SHA1:237D5DDF7969A422991F17021244D13A2BB0DE92
                                                                                                                                                                                          SHA-256:81ECA6840B87F2DEF9FCDD171A55C2D71A49386D88401CE927AE57D7DDD7AAAA
                                                                                                                                                                                          SHA-512:D797781C228B70D2D83DB8ABA08F840CE49846C9473CC89A2E316900D9E08A63142E68AD9ABBB2EF67BF9F1D392772FAB36CCC09632022A1437AE27C11F2284F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: macCentEuro, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1116
                                                                                                                                                                                          Entropy (8bit):3.3992482002374516
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:8ULyHVBUlJvRj7SOVbusZhAMiZyi77qsTMdKxOZwwL+KR5D/jlJy6QWky:8ULyMlBVnrAMiwMmOsL+KR5DblE85
                                                                                                                                                                                          MD5:A60FBDE33D13C732095713D1AB6713AB
                                                                                                                                                                                          SHA1:4B0EB443F2D0E4B8DB7D0435F9311E5F9A625123
                                                                                                                                                                                          SHA-256:BBE6F5EBB5EAB08C91DF7D524FAF39B03AA8B9F84C67ABA0553A84EC56668CB9
                                                                                                                                                                                          SHA-512:3EEBA6BA3FCD875AFBD5DF41EDC21E872416A48D03343232904CC99CAF913045DAF7B1A1ACD0949EF794AD7B6C9AE8F93808423FFC4B67718E732B2FF5D9B6D7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: macCroatian, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..00C400C500C700C900D100D600DC00E100E000E200E400E300E500E700E900E8..00EA00EB00ED00EC00EE00EF00F100F300F200F400F600F500FA00F900FB00FC..202000B000A200A300A7202200B600DF00AE0160212200B400A82260017D00D8..221E00B122642265220600B522022211220F0161222B00AA00BA03A9017E00F8..00BF00A100AC221A01922248010600AB010C202600A000C000C300D501520153..01102014201C201D2018201900F725CAF8FF00A9204420AC2039203A00C600BB..201300B7201A201E
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1116
                                                                                                                                                                                          Entropy (8bit):3.4178221849964903
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:8dHVBUlJvRj7SOVbusZhAMiZyi77qb+SAJlz9a4piS1yk+5yye3cJY:8dMlBVnrAMiwMm8Y6zUk+UVsJY
                                                                                                                                                                                          MD5:C390D66441AC61CCF0A685CA5EE0BC1C
                                                                                                                                                                                          SHA1:FCAE825B54400B9D736EF22A613E359E3F0FA6C2
                                                                                                                                                                                          SHA-256:76EFE571ADDA7AED467F146CB0BD3A2351F2A720508EA0642C419F5347789CAA
                                                                                                                                                                                          SHA-512:C891DB15E0F600965885DE6745EDD2A4E3A6A20CA30A9AAE89CBD8C429F8455C4AF7F2FC053FB3D730D8544AB6A6E78E769DB93DAD7B29868B746FA10373F021
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: macCyrillic, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1116
                                                                                                                                                                                          Entropy (8bit):3.870022681111701
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:87JMHkUlJvRjmf9RCsUBOdXsCbbNviANpkDP1XFAoE4xSF5HrBPkdn:87KvlA9RCs6CXrViANUP1XFA9eSvdPKn
                                                                                                                                                                                          MD5:DCE78527E3A7B7CB1DE9EE5FAF12AFC6
                                                                                                                                                                                          SHA1:20F4A3F4DB6B3422C04EBB6B21A568E4C173F9C1
                                                                                                                                                                                          SHA-256:062E31D48DC33160999074E49205E08C3655DFF91C2C87F254522E6EBCE2DD96
                                                                                                                                                                                          SHA-512:627F5FD2F12B341F2D7EE9032946FE057C4AC74D99687178CEA98B3E150307BB6AA2495B0FA46400760D467E2BF589BE31E998E25CE1D1E8465DA61F22047345
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: macDingbats, single-byte..S..003F 1 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..00202701270227032704260E2706270727082709261B261E270C270D270E270F..2710271127122713271427152716271727182719271A271B271C271D271E271F..2720272127222723272427252726272726052729272A272B272C272D272E272F..2730273127322733273427352736273727382739273A273B273C273D273E273F..2740274127422743274427452746274727482749274A274B25CF274D25A0274F..27502751275225B225BC25C6275625D727582759275A275B275C275D275E007F..F8D7F8D8F8D9F8DAF8DBF8DCF8DDF8DEF8DFF8E0F8E1F8E2F8E3F8E4008E008F..0090009100920093009400950096009700980099009A009B009C009D009E009F..0000276127622763276427652766276726632666266526602460246124622463..2464246524662467246824692776277727782779277A277B277C277D277E277F..2780278127822783278427852786278727882789278A278B278C278D278E278F..2790279127922793279421922194219527982799279A279B279C279D279E279F..27A027A127A227A3
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1113
                                                                                                                                                                                          Entropy (8bit):3.4954458011071323
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:8dOHVBUlJvRj7SOVbusZhAMiZyi77qJlbaBMD2aSY5us36Ekp1ysOSU2imR:8kMlBVnrAMiwMm7aKPVusqx1ysOJjmR
                                                                                                                                                                                          MD5:0CC92F685A4132BE4B030006670D81CE
                                                                                                                                                                                          SHA1:13B1074A90055E9EA061A6206A9C004DA29967A9
                                                                                                                                                                                          SHA-256:1AABE561B5C944ABD11C293D4ACAC0F3A4A5A9E84A0342D066F4E3E992348895
                                                                                                                                                                                          SHA-512:E1AF3D47D681CD68B6063DEC1241631CABE86FE835232FA73D855AC74D0175540D46511282BE7198A67A37970A5D05CDECF55C10424ED9C1413C108F116094D9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: macGreek, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1115
                                                                                                                                                                                          Entropy (8bit):3.3991839018654573
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:8KHVBUlJvRj7SOVbusZhAMiZyi77qscqMVmOZmk/LYRldjY/g4JyMWG:8KMlBVnrAMiwMmzqi/LYRlYBEXG
                                                                                                                                                                                          MD5:747ADBE54D6992467415E322326FA1B9
                                                                                                                                                                                          SHA1:5E3967B5DDF3A6DBF07E90ED6B9B9C2F3F3F35FE
                                                                                                                                                                                          SHA-256:6FD08CE6FBA521D51E8058DE5C2DBD6583B80306A8BE7D015361F76314E70A35
                                                                                                                                                                                          SHA-512:A04B946993985BF1F8FBA3A7A9AD3838F43F8F27F69B1FB1015D9DC8612AAFCE24E30CBC1FCABBDFB359FD487D51F70F18DA0CDA4A87749A2C82309CEB054849
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: macIceland, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):48813
                                                                                                                                                                                          Entropy (8bit):3.3767502114972077
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:K/RPrUHiJrKWkyY/W2wHiwWnwWOORY+gutSJi:KVUidzJCurDGSk
                                                                                                                                                                                          MD5:3DCD22325E0194AAD4959C939B1DE24D
                                                                                                                                                                                          SHA1:ABEF1372FBDA83714CE29E015D9A198D4B37B21C
                                                                                                                                                                                          SHA-256:47007D9EBF4D34C6CE3599E50AFC7C1CF8129B88994DE2C2A857C09003F9CD2B
                                                                                                                                                                                          SHA-512:B8ADFD2315EA38E5F7D4DED219759380069AAB539F1B5AAA5626CE32428CBBEB5E8215AD8351E023BCF72FA4DC30AB40CF59D6D45E33B6D1A6B41BEBFD4BD4C2
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: macJapan, multi-byte..M..003F 0 46..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0080000000000000000000000000000000000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..00A0FF61FF62FF63FF64FF65FF66FF67FF68FF69FF6AFF6BFF6CFF6DFF6EFF6F..FF70FF71FF72FF73FF74FF75FF76FF77FF78FF79FF7AFF7BFF7CFF7DFF7EFF7F..FF80FF81FF82FF83FF84FF85FF86FF87FF88FF89FF8AFF8BFF8CFF8DFF8EFF8F..FF90FF91FF92FF93FF94FF95FF96FF97FF98FF99FF9AFF9BFF9CFF9DFF9EFF9F..0000000000000000000
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1113
                                                                                                                                                                                          Entropy (8bit):3.4060725247347516
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:8THVBUlJvRj7SOVbusZhAMiZyi77qsTMVmOZmk/LYRldjBpmg4JyMWG:8TMlBVnrAMiwMmOi/LYRlTsBEXG
                                                                                                                                                                                          MD5:34691FADC788B85D98F63159640C7DD0
                                                                                                                                                                                          SHA1:C8B3D084D3E831EFF6ECEF71B2029545F214C3D4
                                                                                                                                                                                          SHA-256:C83D971D6BC0284EF323C197896E38C57A5FF44784E451EC2997EDA70C0DD85C
                                                                                                                                                                                          SHA-512:77D5676F9B7AF7FD1D612A1C426889D8F2C0191887E180B78C4AA42202928A1B3078B76BD3C5F5ABB2A5CE1AE913E3CA6EFDE0483D2A2B0EFC173EF25EAE1D67
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: macRoman, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..00C400C500C700C900D100D600DC00E100E000E200E400E300E500E700E900E8..00EA00EB00ED00EC00EE00EF00F100F300F200F400F600F500FA00F900FB00FC..202000B000A200A300A7202200B600DF00AE00A9212200B400A8226000C600D8..221E00B12264226500A500B522022211220F03C0222B00AA00BA03A900E600F8..00BF00A100AC221A01922248220600AB00BB202600A000C000C300D501520153..20132014201C201D2018201900F725CA00FF0178204420AC2039203AFB01FB02..202100B7201A201E203
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1115
                                                                                                                                                                                          Entropy (8bit):3.412326247178521
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:8tHVBUlJvRj7SOVbusZhAMiZyi77qsTMVZ5OZwYRldj/T9g4JyMWG:8tMlBVnrAMiwMmOA7YRlFT9BEXG
                                                                                                                                                                                          MD5:04E25073BFB0019D8381B72F7B433F00
                                                                                                                                                                                          SHA1:B63B0AD9F10A44B0DDD12A3BDBCDEB2992D6D385
                                                                                                                                                                                          SHA-256:0B805DAF21D37D702617A8C72C7345F857695108D905FF378791F291CEA150F0
                                                                                                                                                                                          SHA-512:0514EC054676C15C65B01B02747CDBAD79BC89FD1A24A17797A8729752FB748FEDBE920E7BBFF41A6DA4BA99002E3B8DB674D53E30485DC36F6BF737EAF11702
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: macRomania, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1112
                                                                                                                                                                                          Entropy (8bit):3.6062142626989004
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:88HVBUlJvRj7SOVbusZhAMiZyi77qqJipJwHmEU4AyqU+TpH:88MlBVnrAMiwMmqJ8Jf4AyqUe
                                                                                                                                                                                          MD5:06DC6BA6E4A75CD7FF2D7A4248912C61
                                                                                                                                                                                          SHA1:23FB16763A8F11EF48E805E4F453C2F812D48FC4
                                                                                                                                                                                          SHA-256:A1802A2FEB01B255EC7C17425EEE4525372DF8CE226F4047D149172EB438F913
                                                                                                                                                                                          SHA-512:41A487EC5C36C17B2746C5DC770882A836E6E75CF6A14C31595EB211022F0476BD3B953497C447F21554769F127C3A56E5B6EF8FB3C20A8AFF8C67E0CC94359D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: macThai, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1115
                                                                                                                                                                                          Entropy (8bit):3.422718883614008
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:8QjHVBUlJvRj7SOVbusZhAMiZyi77qsTMVmOZmk/LYRldD8g4JyS:88MlBVnrAMiwMmOi/LYRlWBES
                                                                                                                                                                                          MD5:4EA94A0DB35BED2081A2CC9D627A8180
                                                                                                                                                                                          SHA1:AB2AC3ADA19F3F656780FF876D5B536A8DCE92C6
                                                                                                                                                                                          SHA-256:AFB66138EBE9B87D8B070FE3B6E7D1A05ED508571E9E5B166C3314069D59B4E4
                                                                                                                                                                                          SHA-512:7888F560D3728732BE1B7DCE49ECB61F3399CEF11191F4116C891E1D147B2A90ED8FB4A5E7B51904A001C47750BD9EB1B15EA5BA5B4EC5D69CDE7704B69529AD
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: macTurkish, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1115
                                                                                                                                                                                          Entropy (8bit):3.4157626428238723
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:8TzHVBUlJvRj7SOVbusZhAMiZyi77qb+SAJlz9a4piS1yk+5yye3cJd:8PMlBVnrAMiwMm8Y6zUk+UVsJd
                                                                                                                                                                                          MD5:A5B48D6F2678579CBE6EA094A4655071
                                                                                                                                                                                          SHA1:A13A41D530B21CE8443AFD7E811286537C5BA9C7
                                                                                                                                                                                          SHA-256:F7E11736C9FF30102B31EC72272754110193B347433F4B364921E8F131C92BF0
                                                                                                                                                                                          SHA-512:612F9D528CE940B5CA9E67CB127013A104655207511F4CF39C8696A127E6A8F4867F5603DCFB78C25A55668C6EE70F2997A8D1626F6F1DD44B19260967F17097
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: macUkraine, single-byte..S..003F 0 1..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0410041104120413041404150416041704180419041A041B041C041D041E041F..0420042104220423042404250426042704280429042A042B042C042D042E042F..202000B0049000A300A7202200B6040600AE00A9212204020452226004030453..221E00B122642265045600B504910408040404540407045704090459040A045A..0458040500AC221A01922248220600AB00BB202600A0040B045B040C045C0455..20132014201C201D2018201900F7201E040E045E040F045F211604010451044F..04300431043204330
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):42552
                                                                                                                                                                                          Entropy (8bit):3.5565924983274857
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:w/RPrUHiJrwWkyY/W2wHiwWnwWOORY+gutSX:wVUid5JCurDGSX
                                                                                                                                                                                          MD5:EEB45AF9D7104872FE290D1EC18AB169
                                                                                                                                                                                          SHA1:A80CF4EA46301F0B8B4F0BC306270D7103753871
                                                                                                                                                                                          SHA-256:4A15ED210126BCDAE32543F60EB1A0677F985F32D49FCE923B9FAE8C5BCF3DA4
                                                                                                                                                                                          SHA-512:C359042B04441AA50E536B23EEA0C6C7B2C1893DFB9CDB5459D3B46945D3BB50FD7A32A4F4E26A83622E76D3D2BB0DBBC3D1F3FB87AAF40520A243165B82AB34
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: shiftjis, multi-byte..M..003F 0 40..00..0000000100020003000400050006000700080009000A000B000C000D000E000F..0010001100120013001400150016001700180019001A001B001C001D001E001F..0020002100220023002400250026002700280029002A002B002C002D002E002F..0030003100320033003400350036003700380039003A003B003C003D003E003F..0040004100420043004400450046004700480049004A004B004C004D004E004F..0050005100520053005400550056005700580059005A005B005C005D005E005F..0060006100620063006400650066006700680069006A006B006C006D006E006F..0070007100720073007400750076007700780079007A007B007C007D007E007F..0080000000000000000000850086008700000000000000000000000000000000..0000000000000000000000000000000000000000000000000000000000000000..0000FF61FF62FF63FF64FF65FF66FF67FF68FF69FF6AFF6BFF6CFF6DFF6EFF6F..FF70FF71FF72FF73FF74FF75FF76FF77FF78FF79FF7AFF7BFF7CFF7DFF7EFF7F..FF80FF81FF82FF83FF84FF85FF86FF87FF88FF89FF8AFF8BFF8CFF8DFF8EFF8F..FF90FF91FF92FF93FF94FF95FF96FF97FF98FF99FF9AFF9BFF9CFF9DFF9EFF9F..0000000000000000000
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1111
                                                                                                                                                                                          Entropy (8bit):3.73983895892791
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:SdHkUlJvRjvRV7ZQsoRmSds2AsSemxUs+Jw1Viv6ObTXyn:avlJV7ZQsoRmosGSPxU/JOm6wTXyn
                                                                                                                                                                                          MD5:D59E748D863A5FAEF0CEEC2564E041A3
                                                                                                                                                                                          SHA1:4FFF3BE37F50C090FFC581F1C7769E20281E90C3
                                                                                                                                                                                          SHA-256:9660537A7B62996478555C6F57C1962C78FB3972F19370B2E395C44842818A1F
                                                                                                                                                                                          SHA-512:BF8FD0CF1CC55564C46976F53F441B26819ADBA7AB7BB04FF3FF5A313366FC3049DF29A839CCCB05EDEF4A7ECBB49FFCA62518EDA90AF2D7781874A8435073AE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: symbol, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1112
                                                                                                                                                                                          Entropy (8bit):3.0553142874336943
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:ZlHVBUlJvRj7SOVbusZhAMiZyi77qsDHmEU4AyqU+TWwdd:PMlBVnrAMiwMmss4AyqUSd
                                                                                                                                                                                          MD5:467A67DE6809B796B914F5BFF98EF46D
                                                                                                                                                                                          SHA1:C62418071A6C9CB0DCE3F67E130BFD2FB7AB0B58
                                                                                                                                                                                          SHA-256:50B62381D6EDD4219F4292BFDC365954491B23360DE7C08033E7218A3D29C970
                                                                                                                                                                                          SHA-512:BF98305AA7D759A087B9EABDC404714D8DC6B4F1BEED4ED0E1FFE646641E1AECA307673D64CF95FD09546D977B3409D6C04F56DCCA1D6332B0D9B6DD460B77A9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Encoding file: tis-620, single-byte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
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8235
                                                                                                                                                                                          Entropy (8bit):4.855903177272536
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:Hf8PxPu7pUHBpqyzmY5rEk/fvs+AokFlTGHts1H/tsEGZPBtsLIVn++G:H6Pu7ELJTtyli8Ozz+L
                                                                                                                                                                                          MD5:8609B624CD3EC63DD02DBF89455C3A9B
                                                                                                                                                                                          SHA1:B3E1843E34C38AA668FFDDF435A1A65D55449CA0
                                                                                                                                                                                          SHA-256:5123DB837EADF45712EA7D449BC40BFD3E8E16D3D71E7D0CE9A32F164973D767
                                                                                                                                                                                          SHA-512:B20B75473F34209888F38EE570B8A96061760E88466DFC2EC55C814968DC7F67D92D255E8635188B60455B88F2D1D517747613AD0F366D60412D2D6ECE231B0E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# history.tcl --..#..# Implementation of the history command...#..# Copyright (c) 1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution of..# this file, and for a DISCLAIMER OF ALL WARRANTIES...#.....# The tcl::history array holds the history list and some additional..# bookkeeping variables...#..# nextid.the index used for the next history list item...# keep..the max size of the history list..# oldest.the index of the oldest item in the history.....namespace eval ::tcl {.. variable history.. if {![info exists history]} {...array set history {... nextid.0... keep.20... oldest.-20...}.. }.... namespace ensemble create -command ::tcl::history -map {...add.::tcl::HistAdd...change.::tcl::HistChange...clear.::tcl::HistClear...event.::tcl::HistEvent...info.::tcl::HistInfo...keep.::tcl::HistKeep...nextid.::tcl::HistNextID...redo.::tcl::HistRedo.. }..}.....# history --..#..#.This is the main history command. See the
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):10066
                                                                                                                                                                                          Entropy (8bit):4.806771544139381
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:kipkqA3KsZMAikGJ4kIWPa95KTBoF7dg/8YNkgQ4id:TkqWKsZ8kGJ4kIWPaDFzTd
                                                                                                                                                                                          MD5:C2092F8CA2D761DFA8C461076D956374
                                                                                                                                                                                          SHA1:90B4648B3BC81C30465B0BE83A5DB4127A1392FB
                                                                                                                                                                                          SHA-256:8C474095A3ABA7DF5B488F3D35240D6DE729E57153980C2A898728B8C407A727
                                                                                                                                                                                          SHA-512:09CE408886E2CEADDF70786A15D63AF9A930E70CAC4286AC9DDD2094C8EDCF97A2ADC2D3D2659B123F88719340D3B00D9F96E9BC7C8B55192735C290E7D24683
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# http.tcl..# Client-side HTTP for GET, POST, and HEAD commands...# These routines can be used in untrusted code that uses the Safesock..# security policy...# These procedures use a callback interface to avoid using vwait,..# which is not defined in the safe base...#..# See the http.n man page for documentation....package provide http 1.0....array set http {.. -accept */*.. -proxyhost {}.. -proxyport {}.. -useragent {Tcl http client package 1.0}.. -proxyfilter httpProxyRequired..}..proc http_config {args} {.. global http.. set options [lsort [array names http -*]].. set usage [join $options ", "].. if {[llength $args] == 0} {...set result {}...foreach name $options {... lappend result $name $http($name)...}...return $result.. }.. regsub -all -- - $options {} options.. set pat ^-([join $options |])$.. if {[llength $args] == 1} {...set flag [lindex $args 0]...if {[regexp -- $pat $flag]} {... return $http($flag)...} else {... return -code er
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):746
                                                                                                                                                                                          Entropy (8bit):4.711041943572035
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:jHx5XRsLzhjJS42wbGlTULuUAZb3KykszLl7+HkuRz20JSv6C3l5kMn:bHRsRJS42wbGlTUcZ+yk2Lli1z2jxXkM
                                                                                                                                                                                          MD5:A387908E2FE9D84704C2E47A7F6E9BC5
                                                                                                                                                                                          SHA1:F3C08B3540033A54A59CB3B207E351303C9E29C6
                                                                                                                                                                                          SHA-256:77265723959C092897C2449C5B7768CA72D0EFCD8C505BDDBB7A84F6AA401339
                                                                                                                                                                                          SHA-512:7AC804D23E72E40E7B5532332B4A8D8446C6447BB79B4FE32402B13836079D348998EA0659802AB0065896D4F3C06F5866C6B0D90BF448F53E803D8C243BBC63
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Tcl package index file, version 1.0..# This file is generated by the "pkg_mkIndex" command..# and sourced either when an application starts up or..# by a "package unknown" script. It invokes the..# "package ifneeded" command to set up package-related..# information so that packages will be loaded automatically..# in response to "package require" commands. When this..# script is sourced, the variable $dir must contain the..# full path name of this file's directory.....package ifneeded http 1.0 [list tclPkgSetup $dir http 1.0 {{http.tcl source {httpCopyDone httpCopyStart httpEof httpEvent httpFinish httpMapReply httpProxyRequired http_code http_config http_data http_formatQuery http_get http_reset http_size http_status http_wait}}}]..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:Tcl script, ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):25633
                                                                                                                                                                                          Entropy (8bit):4.8854383645737895
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:rXugPHudKlExBG+Xg3Qonlm6ofRRECLSQDjr5vkhzx/i:ygGdKli4eonlm6offLzehNi
                                                                                                                                                                                          MD5:982EAE7A49263817D83F744FFCD00C0E
                                                                                                                                                                                          SHA1:81723DFEA5576A0916ABEFF639DEBE04CE1D2C83
                                                                                                                                                                                          SHA-256:331BCF0F9F635BD57C3384F2237260D074708B0975C700CFCBDB285F5F59AB1F
                                                                                                                                                                                          SHA-512:31370D8390C4608E7A727EED9EE7F4C568ECB913AE50184B6F105DA9C030F3B9F4B5F17968D8975B2F60DF1B0C5E278512E74267C935FE4EC28F689AC6A97129
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# init.tcl --..#..# Default system startup file for Tcl-based applications. Defines..# "unknown" procedure and auto-load facilities...#..# Copyright (c) 1991-1993 The Regents of the University of California...# Copyright (c) 1994-1996 Sun Microsystems, Inc...# Copyright (c) 1998-1999 Scriptics Corporation...# Copyright (c) 2004 Kevin B. Kenny. All rights reserved...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# This test intentionally written in pre-7.5 Tcl..if {[info commands package] == ""} {.. error "version mismatch: library\nscripts expect Tcl version 7.5b1 or later but the loaded version is\nonly [info patchlevel]"..}..package require -exact Tcl 8.6.12....# Compute the auto path to use in this interpreter...# The values on the path come from several locations:..#..# The environment variable TCLLIBPATH..#..# tcl_library, which is the directory containing this init.tcl script...# [t
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1038
                                                                                                                                                                                          Entropy (8bit):4.10054496357204
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:4EnLB383Hcm0hH9BncmtR7tK9dUVxMmALfpKIdzVJLd3xfjTuLM+vzkHWZ6tH9H0:4aR838HH9ekCkMmEfpK2xx2jiWZ0VbY
                                                                                                                                                                                          MD5:DA8BA1C3041998F5644382A329C3C867
                                                                                                                                                                                          SHA1:CA0BD787A51AD9EDC02EDD679EEEEB3A2932E189
                                                                                                                                                                                          SHA-256:A1EACA556BC0CFBD219376287C72D9DBBFAB76ECF9BF204FD02D40D341BAF7DA
                                                                                                                                                                                          SHA-512:4F086396405FDFE7FBDA7614D143DE9DB41F75BDBD3DB18B1EE9517C3DCCED238DD240B4B64829FD04E50F602DBF371D42A321D04C4C48E4B8B2A067CA1BAF2E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset af DAYS_OF_WEEK_ABBREV [list \.. "So"\.. "Ma"\.. "Di"\.. "Wo"\.. "Do"\.. "Vr"\.. "Sa"].. ::msgcat::mcset af DAYS_OF_WEEK_FULL [list \.. "Sondag"\.. "Maandag"\.. "Dinsdag"\.. "Woensdag"\.. "Donderdag"\.. "Vrydag"\.. "Saterdag"].. ::msgcat::mcset af MONTHS_ABBREV [list \.. "Jan"\.. "Feb"\.. "Mar"\.. "Apr"\.. "Mei"\.. "Jun"\.. "Jul"\.. "Aug"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Des"\.. ""].. ::msgcat::mcset af MONTHS_FULL [list \.. "Januarie"\.. "Februarie"\.. "Maart"\.. "April"\.. "Mei"\.. "Junie"\.. "Julie"\.. "Augustus"\.. "September"\.. "Oktober"\.. "November"\.. "Desember"\.. ""].. ::msgcat::mcset af AM "VM
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.925537696653838
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xouFygMouFqF3v6ay/5ouFy9+3vR6HyFvn:4EnLB383RAgeYF3v6ay/RAI3voSVn
                                                                                                                                                                                          MD5:1B9DCD1C6FCDDC95AE820EA8DA5E15B8
                                                                                                                                                                                          SHA1:E8160353FD415BAB9FD5ACCA14E087C5E6AE836E
                                                                                                                                                                                          SHA-256:1548988458BBF0DFCCC23B7487CEC0E9C64E4CC8E045723E50BEC37C454A8C81
                                                                                                                                                                                          SHA-512:532AF060B95AED5E381B161BE56BC88D91A8F3DF2ACFD835491991F99FE752ADB4A3F93AB6D4E68F7042C28A3C1DD87A6312DFD9FFFAFD6ECE3F1B76837C5B7F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset af_ZA DATE_FORMAT "%d %B %Y".. ::msgcat::mcset af_ZA TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset af_ZA DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2018
                                                                                                                                                                                          Entropy (8bit):4.477377447232708
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83gr/fsS/Sm8p4M/n1KsPktE30AiJcAxi9CEzdEvSCHvMSV:43UkiSm8p3nX0EzdCSCPV
                                                                                                                                                                                          MD5:D264D01B46D96455715114CAEDF9F05E
                                                                                                                                                                                          SHA1:A3F68A4C6E69433BD53E52B73041575F3B3AC3F2
                                                                                                                                                                                          SHA-256:B69D0061A728D59F89FF8621312789CD9F540BF2E2ED297804D22F6278561D85
                                                                                                                                                                                          SHA-512:A4163DAA6821B293EADD5D499E0641A8B7C93180C710D6B364AE8681A8FF6F35EC948C8DDBE960A8466AF1ACABC15B0D465A08B084617E8005D708459F7E74D3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ar DAYS_OF_WEEK_ABBREV [list \.. "\u062d"\.. "\u0646"\.. "\u062b"\.. "\u0631"\.. "\u062e"\.. "\u062c"\.. "\u0633"].. ::msgcat::mcset ar DAYS_OF_WEEK_FULL [list \.. "\u0627\u0644\u0623\u062d\u062f"\.. "\u0627\u0644\u0627\u062b\u0646\u064a\u0646"\.. "\u0627\u0644\u062b\u0644\u0627\u062b\u0627\u0621"\.. "\u0627\u0644\u0623\u0631\u0628\u0639\u0627\u0621"\.. "\u0627\u0644\u062e\u0645\u064a\u0633"\.. "\u0627\u0644\u062c\u0645\u0639\u0629"\.. "\u0627\u0644\u0633\u0628\u062a"].. ::msgcat::mcset ar MONTHS_ABBREV [list \.. "\u064a\u0646\u0627"\.. "\u0641\u0628\u0631"\.. "\u0645\u0627\u0631"\.. "\u0623\u0628\u0631"\.. "\u0645\u0627\u064a"\.. "\u064a\u0648\u0646"\.. "\u064a\u0648\u0644"\.. "\u0623\u063a\u0633"\.. "\u0633\u0628\u062a"\..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):265
                                                                                                                                                                                          Entropy (8bit):4.872222510420193
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoKNvfcoKU3v6xyFjoKNo+3vfXM68vn:4EnLB3831vfD3v6g9F3vfc6+n
                                                                                                                                                                                          MD5:430498B4AB1E77C86BC1311A49747581
                                                                                                                                                                                          SHA1:684EAD965D9010C2A6E73DCACB2224FDE585F9FF
                                                                                                                                                                                          SHA-256:2E04B96DA002519D28125918A22FF2BB9659A668A7BCAD34D85DDDECEC8DC0B4
                                                                                                                                                                                          SHA-512:9F85A88A383DCFC54DAA6253D94C307A14B1CC91D5C97AF817B8122AF98025AB2430D0B2D656EBED09E78FB854D1F9CF99F3B791A6ECB7834112012739140126
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ar_IN DATE_FORMAT "%A %d %B %Y".. ::msgcat::mcset ar_IN TIME_FORMAT_12 "%I:%M:%S %z".. ::msgcat::mcset ar_IN DATE_TIME_FORMAT "%A %d %B %Y %I:%M:%S %z %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1851
                                                                                                                                                                                          Entropy (8bit):4.08645484776227
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83sxS/Sm819+es/Ii/R91bpH0+U0c+es/Ii/R91bpH0+UO:43wiSm815MbJbHgMbJbp
                                                                                                                                                                                          MD5:5C62D606F4F14BC8994B28F9622D70DD
                                                                                                                                                                                          SHA1:E99F8CC5D330085545B05B69213E9D011D436990
                                                                                                                                                                                          SHA-256:5ADBB3D37C3369E5FC80D6A462C82598D5A22FAEF0E8DF6B3148231D2C6A7F73
                                                                                                                                                                                          SHA-512:81AC9200459B0896E27A028BD089A174F7F921B0367BC8FF1AB33D3E561417B6F8EC23DAB750ECB408AC8A11CDFDBFA4F890F9E723BB8607B017C9FEE00928A0
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ar_JO DAYS_OF_WEEK_ABBREV [list \.. "\u0627\u0644\u0623\u062d\u062f"\.. "\u0627\u0644\u0627\u062b\u0646\u064a\u0646"\.. "\u0627\u0644\u062b\u0644\u0627\u062b\u0627\u0621"\.. "\u0627\u0644\u0623\u0631\u0628\u0639\u0627\u0621"\.. "\u0627\u0644\u062e\u0645\u064a\u0633"\.. "\u0627\u0644\u062c\u0645\u0639\u0629"\.. "\u0627\u0644\u0633\u0628\u062a"].. ::msgcat::mcset ar_JO MONTHS_ABBREV [list \.. "\u0643\u0627\u0646\u0648\u0646 \u0627\u0644\u062b\u0627\u0646\u064a"\.. "\u0634\u0628\u0627\u0637"\.. "\u0622\u0630\u0627\u0631"\.. "\u0646\u064a\u0633\u0627\u0646"\.. "\u0646\u0648\u0627\u0631"\.. "\u062d\u0632\u064a\u0631\u0627\u0646"\.. "\u062a\u0645\u0648\u0632"\.. "\u0622\u0628"\.. "\u0623\u064a\u0644\u0648\u0644"\.. "\u062a\u0634\u0631\u064a\u0646 \u0627\u0644\u0623\u0648\u064
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1851
                                                                                                                                                                                          Entropy (8bit):4.083347689510237
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83LxS/Sm8S9+es/Ii/R91bpH0+U/c+es/Ii/R91bpH0+UO:431iSm8S5MbJbQgMbJbp
                                                                                                                                                                                          MD5:6FC1CC738207E2F8E0871103841BC0D4
                                                                                                                                                                                          SHA1:D2C62C7F6DA1EF399FCBE2BA91C9562C87E6152F
                                                                                                                                                                                          SHA-256:1FC13070CF661488E90FECE84274C46B1F4CC7E1565EAB8F829CCAA65108DFCA
                                                                                                                                                                                          SHA-512:E547D5CBB746654051AFDA21942075BC2224C2FF75D440C6C34C642AD24CF622E520FF919B8BD4AFC0116D9CE69B3ABA4E81EE247C1388F3C5741150201F5C60
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ar_LB DAYS_OF_WEEK_ABBREV [list \.. "\u0627\u0644\u0623\u062d\u062f"\.. "\u0627\u0644\u0627\u062b\u0646\u064a\u0646"\.. "\u0627\u0644\u062b\u0644\u0627\u062b\u0627\u0621"\.. "\u0627\u0644\u0623\u0631\u0628\u0639\u0627\u0621"\.. "\u0627\u0644\u062e\u0645\u064a\u0633"\.. "\u0627\u0644\u062c\u0645\u0639\u0629"\.. "\u0627\u0644\u0633\u0628\u062a"].. ::msgcat::mcset ar_LB MONTHS_ABBREV [list \.. "\u0643\u0627\u0646\u0648\u0646 \u0627\u0644\u062b\u0627\u0646\u064a"\.. "\u0634\u0628\u0627\u0637"\.. "\u0622\u0630\u0627\u0631"\.. "\u0646\u064a\u0633\u0627\u0646"\.. "\u0646\u0648\u0627\u0631"\.. "\u062d\u0632\u064a\u0631\u0627\u0646"\.. "\u062a\u0645\u0648\u0632"\.. "\u0622\u0628"\.. "\u0623\u064a\u0644\u0648\u0644"\.. "\u062a\u0634\u0631\u064a\u0646 \u0627\u0644\u0623\u0648\u064
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1851
                                                                                                                                                                                          Entropy (8bit):4.084701680556524
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83lxS/Sm8M9+es/Ii/R91bpH0+UBc+es/Iv/I91bpH0+UO:43LiSm8M5MbJbSgMo0bp
                                                                                                                                                                                          MD5:8188C37CA44FEFFF8D895AAD503AD4F6
                                                                                                                                                                                          SHA1:C48F2E3B9FC055704D2DAFDC67E9D08EE6897D45
                                                                                                                                                                                          SHA-256:294F3E46C55453EDAD44567E1330F9B43E69A07FA0655B24DD2780A4490C1194
                                                                                                                                                                                          SHA-512:F86FCFC7C460473D46C472041AB2E1F9388CF34BCA9050295D1DAE454E35A2A0320D0C61D5E8CBB832AF74FFDD1A7511AF32EA2A53B481F39A1CBCF5F086D514
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ar_SY DAYS_OF_WEEK_ABBREV [list \.. "\u0627\u0644\u0623\u062d\u062f"\.. "\u0627\u0644\u0627\u062b\u0646\u064a\u0646"\.. "\u0627\u0644\u062b\u0644\u0627\u062b\u0627\u0621"\.. "\u0627\u0644\u0623\u0631\u0628\u0639\u0627\u0621"\.. "\u0627\u0644\u062e\u0645\u064a\u0633"\.. "\u0627\u0644\u062c\u0645\u0639\u0629"\.. "\u0627\u0644\u0633\u0628\u062a"].. ::msgcat::mcset ar_SY MONTHS_ABBREV [list \.. "\u0643\u0627\u0646\u0648\u0646 \u0627\u0644\u062b\u0627\u0646\u064a"\.. "\u0634\u0628\u0627\u0637"\.. "\u0622\u0630\u0627\u0631"\.. "\u0646\u064a\u0633\u0627\u0646"\.. "\u0646\u0648\u0627\u0631"\.. "\u062d\u0632\u064a\u0631\u0627\u0646"\.. "\u062a\u0645\u0648\u0632"\.. "\u0622\u0628"\.. "\u0623\u064a\u0644\u0648\u0644"\.. "\u062a\u0634\u0631\u064a\u0646 \u0627\u0644\u0623\u0648\u064
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2157
                                                                                                                                                                                          Entropy (8bit):4.27810535662921
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:43PI8IKQGQ8mA/XxQJxQnA9QJlPyI/tbCaQICMIcQ8InVI5tNIzQFIQQLtChjsI4:2PItK5BSb9ajfycCW5IzdQNxK
                                                                                                                                                                                          MD5:6334BDDFC1E0EAE4DBB2C90F85818FD8
                                                                                                                                                                                          SHA1:085EDC3D027D6B5A6A6A2561717EA89C8F8B8B39
                                                                                                                                                                                          SHA-256:A636A82C7D00CCDC0AF2496043FFA320F17B0D48A1232708810D3BB1453E881E
                                                                                                                                                                                          SHA-512:18ADB77314FCFD534E55B234B3A53A0BC572AB60B80D099D2F3B20E0C5FE66179FDC076AA43200DB3CA123BC6216989EC41448FA624D3BA9633413AD8AD6034C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset be DAYS_OF_WEEK_ABBREV [list \.. "\u043d\u0434"\.. "\u043f\u043d"\.. "\u0430\u0442"\.. "\u0441\u0440"\.. "\u0447\u0446"\.. "\u043f\u0442"\.. "\u0441\u0431"].. ::msgcat::mcset be DAYS_OF_WEEK_FULL [list \.. "\u043d\u044f\u0434\u0437\u0435\u043b\u044f"\.. "\u043f\u0430\u043d\u044f\u0434\u0437\u0435\u043b\u0430\u043a"\.. "\u0430\u045e\u0442\u043e\u0440\u0430\u043a"\.. "\u0441\u0435\u0440\u0430\u0434\u0430"\.. "\u0447\u0430\u0446\u0432\u0435\u0440"\.. "\u043f\u044f\u0442\u043d\u0456\u0446\u0430"\.. "\u0441\u0443\u0431\u043e\u0442\u0430"].. ::msgcat::mcset be MONTHS_ABBREV [list \.. "\u0441\u0442\u0434"\.. "\u043b\u044e\u0442"\.. "\u0441\u043a\u0432"\.. "\u043a\u0440\u0441"\.. "\u043c\u0430\u0439"\.. "\u0447\u0440\u0432"\.. "\u043b\u043f\u043d"
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1871
                                                                                                                                                                                          Entropy (8bit):4.4251657008559935
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:43EUAIlnQf/QVdQ81mnEZqEavWQEQ3QvQrQL0QjQTtQDCQSY4tqP:27xMk+nEZqE3biIYbUi+C9y
                                                                                                                                                                                          MD5:E5225D6478C60E2502D18698BB917677
                                                                                                                                                                                          SHA1:52D611CB5351FB873D2535246B3A3C1A37094023
                                                                                                                                                                                          SHA-256:CFE4E44A3A751F113847667EC9EA741E762BBDE0D4284822CB337DF0F92C1ACA
                                                                                                                                                                                          SHA-512:59AB167177101088057BF4EE0F70262987A2177ECB72C613CCAAE2F3E8D8B77F07D15DA5BE3B8728E23C31A1C9736030AA4036A8CD00A24791751A298B3A88B3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset bg DAYS_OF_WEEK_ABBREV [list \.. "\u041d\u0434"\.. "\u041f\u043d"\.. "\u0412\u0442"\.. "\u0421\u0440"\.. "\u0427\u0442"\.. "\u041f\u0442"\.. "\u0421\u0431"].. ::msgcat::mcset bg DAYS_OF_WEEK_FULL [list \.. "\u041d\u0435\u0434\u0435\u043b\u044f"\.. "\u041f\u043e\u043d\u0435\u0434\u0435\u043b\u043d\u0438\u043a"\.. "\u0412\u0442\u043e\u0440\u043d\u0438\u043a"\.. "\u0421\u0440\u044f\u0434\u0430"\.. "\u0427\u0435\u0442\u0432\u044a\u0440\u0442\u044a\u043a"\.. "\u041f\u0435\u0442\u044a\u043a"\.. "\u0421\u044a\u0431\u043e\u0442\u0430"].. ::msgcat::mcset bg MONTHS_ABBREV [list \.. "I"\.. "II"\.. "III"\.. "IV"\.. "V"\.. "VI"\.. "VII"\.. "VIII"\.. "IX"\.. "X"\.. "XI"\.. "XII"\.. ""].. ::msgcat::mcset bg MO
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2335
                                                                                                                                                                                          Entropy (8bit):4.107102006297273
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR835e/MWrD//6HFEVcVVcCVcTUTVckVEVcT7VcEEVcby/Vcn0VcMr/0VcM8VcQ:43ktX++QalMObalMZ6IE6V
                                                                                                                                                                                          MD5:5D25E7FC65824AC987535FEA14A4045C
                                                                                                                                                                                          SHA1:85C10F05823CD3263FC7B3EC38796BEC261B3716
                                                                                                                                                                                          SHA-256:890EA6521DEB1B3C3913CCD92562F6360E064DAEE2E2B0356A6DD97A46264A1F
                                                                                                                                                                                          SHA-512:5D8A88ACAEBBF3CD721F288FA0F1FEE517EE568CA5482E30CFA1E36CD37DF011C449090E2D9041F1D046A191F13D4C5C4B6F9E2F16FD259E63CE46ECC4E4F81F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset bn DAYS_OF_WEEK_ABBREV [list \.. "\u09b0\u09ac\u09bf"\.. "\u09b8\u09cb\u09ae"\.. "\u09ae\u0999\u0997\u09b2"\.. "\u09ac\u09c1\u09a7"\.. "\u09ac\u09c3\u09b9\u09b8\u09cd\u09aa\u09a4\u09bf"\.. "\u09b6\u09c1\u0995\u09cd\u09b0"\.. "\u09b6\u09a8\u09bf"].. ::msgcat::mcset bn DAYS_OF_WEEK_FULL [list \.. "\u09b0\u09ac\u09bf\u09ac\u09be\u09b0"\.. "\u09b8\u09cb\u09ae\u09ac\u09be\u09b0"\.. "\u09ae\u0999\u0997\u09b2\u09ac\u09be\u09b0"\.. "\u09ac\u09c1\u09a7\u09ac\u09be\u09b0"\.. "\u09ac\u09c3\u09b9\u09b8\u09cd\u09aa\u09a4\u09bf\u09ac\u09be\u09b0"\.. "\u09b6\u09c1\u0995\u09cd\u09b0\u09ac\u09be\u09b0"\.. "\u09b6\u09a8\u09bf\u09ac\u09be\u09b0"].. ::msgcat::mcset bn MONTHS_ABBREV [list \.. "\u099c\u09be\u09a8\u09c1\u09df\u09be\u09b0\u09c0"\.. "\u09ab\u09c7\u09ac\u09cd\u09b0\u09c1\u09df\u09be
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):265
                                                                                                                                                                                          Entropy (8bit):4.868201122972066
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xovtvfluo/E3v6xyFjovto+3vflm68vn:4EnLB383UtvfltE3v6g8tF3vflm6+n
                                                                                                                                                                                          MD5:B91BB2ABC23B90962D2070B9588F2AB5
                                                                                                                                                                                          SHA1:CBB4E9CD600773792C6E9F3E6B27E99C1846B44F
                                                                                                                                                                                          SHA-256:B3D8A4632290B0F3DA690E47C1FDF06A8B9E171A96E938AFDB0DD52CF806CE54
                                                                                                                                                                                          SHA-512:932FC4B8C3CA72731187D56012AD7DD7777C4D447F16EEB17B9D68235C9590DF99992FD22B8D7C85A843A610F93CD36FAFA993C34C441255A1C0A93C73BC5FE4
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset bn_IN DATE_FORMAT "%A %d %b %Y".. ::msgcat::mcset bn_IN TIME_FORMAT_12 "%I:%M:%S %z".. ::msgcat::mcset bn_IN DATE_TIME_FORMAT "%A %d %b %Y %I:%M:%S %z %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1152
                                                                                                                                                                                          Entropy (8bit):4.2880653012847985
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83FMVBNfPg+g+RjMu5+C6MB4zdiwvWvn:432g6jh65zd3gn
                                                                                                                                                                                          MD5:72DDD60C907DD235BCE4AB0A5AEE902C
                                                                                                                                                                                          SHA1:06150F793251687E6FBC3FDA3BC81BCBFC7DE763
                                                                                                                                                                                          SHA-256:3BE295DCC8FCDC767FED0C68E3867359C18E7E57D7DB6C07236B5BC572AD328E
                                                                                                                                                                                          SHA-512:3B0A85003692F1E46185D5CC09236D2DA5E6D29166C9812D07A7D6BF6AC6C3B0708F91C6899768D4DBA3528081B8B43E09F49622B70F1CF991AFAC5352B6BA37
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ca DAYS_OF_WEEK_ABBREV [list \.. "dg."\.. "dl."\.. "dt."\.. "dc."\.. "dj."\.. "dv."\.. "ds."].. ::msgcat::mcset ca DAYS_OF_WEEK_FULL [list \.. "diumenge"\.. "dilluns"\.. "dimarts"\.. "dimecres"\.. "dijous"\.. "divendres"\.. "dissabte"].. ::msgcat::mcset ca MONTHS_ABBREV [list \.. "gen."\.. "feb."\.. "mar\u00e7"\.. "abr."\.. "maig"\.. "juny"\.. "jul."\.. "ag."\.. "set."\.. "oct."\.. "nov."\.. "des."\.. ""].. ::msgcat::mcset ca MONTHS_FULL [list \.. "gener"\.. "febrer"\.. "mar\u00e7"\.. "abril"\.. "maig"\.. "juny"\.. "juliol"\.. "agost"\.. "setembre"\.. "octubre"\.. "novembre"\.. "desembre"\.. ""].. ::msg
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1354
                                                                                                                                                                                          Entropy (8bit):4.466447248030554
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83U4nZ4yJTkkG3mYWEZqO1R3DNBEVG+PYhxrU4UF3ecCvt7/v3e6:43TJTGmnEZqE5/EVEDOGtDp
                                                                                                                                                                                          MD5:F32EAD82CC26754C5A8E092873A28DB3
                                                                                                                                                                                          SHA1:325124660F62242B24623B4B737CB4616F86CFF3
                                                                                                                                                                                          SHA-256:AFEA12A16A6FA750EA610245133B90F178BA714848F89AEC37429A3E7B06BE1A
                                                                                                                                                                                          SHA-512:04E335AAFBF4D169983635FC87BCFFE86FBA570A3E1820D20240EF7B47E7A3CD94AE3598543DCE92A1F82B5146CAAD982EFE9490EFD9E581D58515CFC3930581
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset cs DAYS_OF_WEEK_ABBREV [list \.. "Ne"\.. "Po"\.. "\u00dat"\.. "St"\.. "\u010ct"\.. "P\u00e1"\.. "So"].. ::msgcat::mcset cs DAYS_OF_WEEK_FULL [list \.. "Ned\u011ble"\.. "Pond\u011bl\u00ed"\.. "\u00dater\u00fd"\.. "St\u0159eda"\.. "\u010ctvrtek"\.. "P\u00e1tek"\.. "Sobota"].. ::msgcat::mcset cs MONTHS_ABBREV [list \.. "I"\.. "II"\.. "III"\.. "IV"\.. "V"\.. "VI"\.. "VII"\.. "VIII"\.. "IX"\.. "X"\.. "XI"\.. "XII"\.. ""].. ::msgcat::mcset cs MONTHS_FULL [list \.. "leden"\.. "\u00fanor"\.. "b\u0159ezen"\.. "duben"\.. "kv\u011bten"\.. "\u010derven"\.. "\u010dervenec"\.. "srpen"\.. "z\u00e1\u0159\u00ed"\.. "\u0159\u00edjen"\..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1208
                                                                                                                                                                                          Entropy (8bit):4.315504392809956
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83wV0tBVYuorIsmZ5meAxyISjTHU92WFVwpwvbvT:43w+DiuorreAY0zw8rT
                                                                                                                                                                                          MD5:27A6A8BE8903AEF9D0BE956906A89583
                                                                                                                                                                                          SHA1:EE29FDF67CB3AE150DF6BBBE603C1C3F5DA28641
                                                                                                                                                                                          SHA-256:0D422A991BCA13FE9033118691CFEDAB0F372222EBB0BC92BAF8E914EE816B84
                                                                                                                                                                                          SHA-512:0E702A679AD94BF479226B7DE32077562F3F95210F6453AE564138386DBB179941BA5359AEE9AC532F4A6E5BE745D6962D6B638A21DD48B865716F2FD2A0CB01
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset da DAYS_OF_WEEK_ABBREV [list \.. "s\u00f8"\.. "ma"\.. "ti"\.. "on"\.. "to"\.. "fr"\.. "l\u00f8"].. ::msgcat::mcset da DAYS_OF_WEEK_FULL [list \.. "s\u00f8ndag"\.. "mandag"\.. "tirsdag"\.. "onsdag"\.. "torsdag"\.. "fredag"\.. "l\u00f8rdag"].. ::msgcat::mcset da MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "maj"\.. "jun"\.. "jul"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "dec"\.. ""].. ::msgcat::mcset da MONTHS_FULL [list \.. "januar"\.. "februar"\.. "marts"\.. "april"\.. "maj"\.. "juni"\.. "juli"\.. "august"\.. "september"\.. "oktober"\.. "november"\.. "december"\.. ""].. ::msgcat::mcset da B
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1276
                                                                                                                                                                                          Entropy (8bit):4.349293509679722
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83cFNSsZKKgXum47fpK2OaSIui7dHqWZ0ZIBFJWJvvvWIn:43InZKKgXoOqx1W67W9XWIn
                                                                                                                                                                                          MD5:EE3963A5F7E29C05C9617BE3FD897114
                                                                                                                                                                                          SHA1:0F978CA174DF596817F872B5EF1B447B9DFE651C
                                                                                                                                                                                          SHA-256:4C27733502066E8391654D1D372F92BF0484C5A3821E121AE8AA5B99378C99AE
                                                                                                                                                                                          SHA-512:EA933709C68F8199858A1CC1FFDA67EE7458CC57A163E672535EB0B4C37BFDC200604C7506748DAC3158B6CA63C2F076A2C6252B2A596E59F83D3B1D4BC9C901
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset de DAYS_OF_WEEK_ABBREV [list \.. "So"\.. "Mo"\.. "Di"\.. "Mi"\.. "Do"\.. "Fr"\.. "Sa"].. ::msgcat::mcset de DAYS_OF_WEEK_FULL [list \.. "Sonntag"\.. "Montag"\.. "Dienstag"\.. "Mittwoch"\.. "Donnerstag"\.. "Freitag"\.. "Samstag"].. ::msgcat::mcset de MONTHS_ABBREV [list \.. "Jan"\.. "Feb"\.. "Mrz"\.. "Apr"\.. "Mai"\.. "Jun"\.. "Jul"\.. "Aug"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Dez"\.. ""].. ::msgcat::mcset de MONTHS_FULL [list \.. "Januar"\.. "Februar"\.. "M\u00e4rz"\.. "April"\.. "Mai"\.. "Juni"\.. "Juli"\.. "August"\.. "September"\.. "Oktober"\.. "November"\.. "Dezember"\.. ""].. ::msgcat::mcset de BCE "v.
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):847
                                                                                                                                                                                          Entropy (8bit):4.412930056658995
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR831sMm47fpK2++SIui7dHqWZ0ZItovGvzvW:431h+mx1Wm+QjW
                                                                                                                                                                                          MD5:A6227CD4F7434952D093F1F3C64B4378
                                                                                                                                                                                          SHA1:0DDB9A49CB83DDF2396B2ECA85093260710496C2
                                                                                                                                                                                          SHA-256:1C02D14140196623297F858E2EEF00B4159E1C6FAFE044EC65A48C9C24D46540
                                                                                                                                                                                          SHA-512:D63F34024356F5CE0335D14EA557F4BBF238CCA8265DD27C039C70F7F28FE737F368B030DEE10B2C536512D2815E1F5B19838D08745C6A76A39050D573597EB3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset de_AT MONTHS_ABBREV [list \.. "J\u00e4n"\.. "Feb"\.. "M\u00e4r"\.. "Apr"\.. "Mai"\.. "Jun"\.. "Jul"\.. "Aug"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Dez"\.. ""].. ::msgcat::mcset de_AT MONTHS_FULL [list \.. "J\u00e4nner"\.. "Februar"\.. "M\u00e4rz"\.. "April"\.. "Mai"\.. "Juni"\.. "Juli"\.. "August"\.. "September"\.. "Oktober"\.. "November"\.. "Dezember"\.. ""].. ::msgcat::mcset de_AT DATE_FORMAT "%Y-%m-%d".. ::msgcat::mcset de_AT TIME_FORMAT "%T".. ::msgcat::mcset de_AT TIME_FORMAT_12 "%T".. ::msgcat::mcset de_AT DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1276
                                                                                                                                                                                          Entropy (8bit):4.389082225723362
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83B8VSysVB8VsZKKgJ5Mm47fpK26aSIui7dHqWZ0ZIlj5VevjevbDvW:43Bt1VBbZKKgJs6qx1Wc5VojobzW
                                                                                                                                                                                          MD5:C351057D8E5328C0790901D1F4DBEC9F
                                                                                                                                                                                          SHA1:F73DE8AEF7F8083B0726760AA003E81067A68588
                                                                                                                                                                                          SHA-256:532845CD15EC821C1939D000C648694A64E8CA8F0C14BAD5D79682CF991481CE
                                                                                                                                                                                          SHA-512:8152AD082D0A6A4EBE7E1CCA9D4A5F2E48ABE3F09F4385A517C523A67CA3B08E0F20C193D0F6850F37E55ED0CD6FBD201FE22CC824AF170976D04DB061212F2D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset de_BE DAYS_OF_WEEK_ABBREV [list \.. "Son"\.. "Mon"\.. "Die"\.. "Mit"\.. "Don"\.. "Fre"\.. "Sam"].. ::msgcat::mcset de_BE DAYS_OF_WEEK_FULL [list \.. "Sonntag"\.. "Montag"\.. "Dienstag"\.. "Mittwoch"\.. "Donnerstag"\.. "Freitag"\.. "Samstag"].. ::msgcat::mcset de_BE MONTHS_ABBREV [list \.. "Jan"\.. "Feb"\.. "M\u00e4r"\.. "Apr"\.. "Mai"\.. "Jun"\.. "Jul"\.. "Aug"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Dez"\.. ""].. ::msgcat::mcset de_BE MONTHS_FULL [list \.. "Januar"\.. "Februar"\.. "M\u00e4rz"\.. "April"\.. "Mai"\.. "Juni"\.. "Juli"\.. "August"\.. "September"\.. "Oktober"\.. "November"\.. "Dezember"\.. ""].. ::m
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2304
                                                                                                                                                                                          Entropy (8bit):4.371322909589862
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR833v+ZYYWtv+nWfFyL1NYOg+EKVJQ19tWQYmYaYRn9sWuSAJIJ6eRa6WrmdlX:43/pZyLjY0uYR9QmdkjC9r
                                                                                                                                                                                          MD5:7DD14B1F4FF532DCAF6D4C6F0DF82E9A
                                                                                                                                                                                          SHA1:707875FEF4207EBB71D066FDC54C7F68560C6DAD
                                                                                                                                                                                          SHA-256:8B23E0E2F0F319BB9A2DFDCCDC565FF79A62FA85094811189B6BC41594232B6B
                                                                                                                                                                                          SHA-512:5ECA072DE5DD7890270AE268C7C8D40EE2DB6966643604D16E54194DB0AD74FDA8D04848331E61B387E8B494AF18252E38671D939069EC4C90C672A629563B88
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset el DAYS_OF_WEEK_ABBREV [list \.. "\u039a\u03c5\u03c1"\.. "\u0394\u03b5\u03c5"\.. "\u03a4\u03c1\u03b9"\.. "\u03a4\u03b5\u03c4"\.. "\u03a0\u03b5\u03bc"\.. "\u03a0\u03b1\u03c1"\.. "\u03a3\u03b1\u03b2"].. ::msgcat::mcset el DAYS_OF_WEEK_FULL [list \.. "\u039a\u03c5\u03c1\u03b9\u03b1\u03ba\u03ae"\.. "\u0394\u03b5\u03c5\u03c4\u03ad\u03c1\u03b1"\.. "\u03a4\u03c1\u03af\u03c4\u03b7"\.. "\u03a4\u03b5\u03c4\u03ac\u03c1\u03c4\u03b7"\.. "\u03a0\u03ad\u03bc\u03c0\u03c4\u03b7"\.. "\u03a0\u03b1\u03c1\u03b1\u03c3\u03ba\u03b5\u03c5\u03ae"\.. "\u03a3\u03ac\u03b2\u03b2\u03b1\u03c4\u03bf"].. ::msgcat::mcset el MONTHS_ABBREV [list \.. "\u0399\u03b1\u03bd"\.. "\u03a6\u03b5\u03b2"\.. "\u039c\u03b1\u03c1"\.. "\u0391\u03c0\u03c1"\.. "\u039c\u03b1\u03ca"\.. "\u0399\u03bf\u
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):307
                                                                                                                                                                                          Entropy (8bit):4.896073290907262
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoCwmGjbmvFjoCws6W3v1oCws6W3v6p6HyFjoCwmT+3vjbe:4EnLB383QrmdSs6W3vss6W3v6QSoJ3ve
                                                                                                                                                                                          MD5:5B31AD8AC0000B01C4BD04BF6FC4784C
                                                                                                                                                                                          SHA1:F55145B473DDCAE38A0F7297D58B80B12B2A5271
                                                                                                                                                                                          SHA-256:705C66C14B6DE682EC7408EABDBA0800C626629E64458971BC8A4CBD3D5DB111
                                                                                                                                                                                          SHA-512:1CCE6BCAE5D1F7D80E10687F0BCA2AE1B2DD53F04A0F443DC9B552804D60E708E64326B62BA4E3787325D89837B4AC8CCCA9AF6F39CBD654BCC8A9C27EA63BB8
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_AU DATE_FORMAT "%e/%m/%Y".. ::msgcat::mcset en_AU TIME_FORMAT "%H:%M:%S".. ::msgcat::mcset en_AU TIME_FORMAT_12 "%I:%M:%S %P %z".. ::msgcat::mcset en_AU DATE_TIME_FORMAT "%e/%m/%Y %H:%M:%S %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):312
                                                                                                                                                                                          Entropy (8bit):4.870560620756039
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoCr3FuoCsX3vtfNrsoCsX3v6YNIdjoCs+3v3FnN9vn:4EnLB383H3Fb3vtNN3v6y43v3FnNNn
                                                                                                                                                                                          MD5:DDA87ACED97F9F7771788A1A0A1E4433
                                                                                                                                                                                          SHA1:E221653CD659C095098180344654770FF059331B
                                                                                                                                                                                          SHA-256:BC87754A253C1036E423FA553DA182DBC56F62A13EDA811D8CD9E8AFA40404A6
                                                                                                                                                                                          SHA-512:BB95D9241B05686CA15C413746DD06071635CB070F38847BE9702397A86C01A3D54DEBE1ACAA51834AB74DB8D0F75E353995183864E382721425756EE46B0B1E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_BE DATE_FORMAT "%d %b %Y".. ::msgcat::mcset en_BE TIME_FORMAT "%k:%M:%S".. ::msgcat::mcset en_BE TIME_FORMAT_12 "%k h %M min %S s %z".. ::msgcat::mcset en_BE DATE_TIME_FORMAT "%d %b %Y %k:%M:%S %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.915769170926952
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xosmGMoss6W3v6ay/5osmT+3vR6HyFvn:4EnLB383hr8s6W3v6ay/hJ3voSVn
                                                                                                                                                                                          MD5:4CBF90CE15ECCB6B695AA78D7D659454
                                                                                                                                                                                          SHA1:30C26ADB03978C5E7288B964A14B692813D6E0B8
                                                                                                                                                                                          SHA-256:EC48F18995D46F82B1CC71EA285174505A50E3BA2017BCCE2D807149B7543FD0
                                                                                                                                                                                          SHA-512:CC809EBD1B2B5D9E918C2E2CE4E7075DFB0744C583F17C1C234D8437EF0C34654D2F09FF77544AD3430CEC78ABC70AA5F85F71AD1489A687B8087FCDFE07B088
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_BW DATE_FORMAT "%d %B %Y".. ::msgcat::mcset en_BW TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset en_BW DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):295
                                                                                                                                                                                          Entropy (8bit):4.87629705076992
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoAhgqyFjoAZF3vX5oAZF3v6cvBoAh9+3vnFDL8vn:4EnLB383FhgqWDZF3vVZF3v6cvdhI3vM
                                                                                                                                                                                          MD5:BFC4A48F5B10D137A4D32B440C47D3C6
                                                                                                                                                                                          SHA1:C90EF2A8291DE589BC12D0A5B8AF2F0B00FEB7CD
                                                                                                                                                                                          SHA-256:3CF2D0937FD95264549CF5C768B898F01D4875A3EB4A85D457D758BC11DFEC6E
                                                                                                                                                                                          SHA-512:A91B81A956A438CA7274491CA107A2647CBDFB8AEB5FD7A58238F315590C74F83F2EBA4AA5C4E9A4A54F1FC1636318E94E5E4BBEA467326E0EACED079741E640
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_CA DATE_FORMAT "%d/%m/%y".. ::msgcat::mcset en_CA TIME_FORMAT "%r".. ::msgcat::mcset en_CA TIME_FORMAT_12 "%I:%M:%S %p".. ::msgcat::mcset en_CA DATE_TIME_FORMAT "%a %d %b %Y %r %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):286
                                                                                                                                                                                          Entropy (8bit):4.892405843607203
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoEbtvqyFjoELE3vLjoELE3v6mjoEbto+3vnFDoAkvn:4EnLB383BbtvqWHLE3vTLE3v6EbtF3vW
                                                                                                                                                                                          MD5:52E55DE8C489265064A01CEEC823DCDD
                                                                                                                                                                                          SHA1:16F314A56AE0EAC9DAD58ADDEA6B25813A5BAA05
                                                                                                                                                                                          SHA-256:C2CE5B74F9E9C190B21C5DF4106303B7B794481228FB9A57065B9C822A1059C3
                                                                                                                                                                                          SHA-512:6010F29BF75D0CB4EE4F10781423A8CC68D5018DE8C633CD1217A7FE1299A0532E8C0E5D120188B748171EB255C587BB0B64B7384A58F725F3B6A4B9EA04393E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_GB DATE_FORMAT "%d/%m/%y".. ::msgcat::mcset en_GB TIME_FORMAT "%T".. ::msgcat::mcset en_GB TIME_FORMAT_12 "%T".. ::msgcat::mcset en_GB DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):329
                                                                                                                                                                                          Entropy (8bit):4.851471679101967
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoa+joaQ9PoaAx/G4soaYYW3v6ay/5oaAx/T+3v4x6HyFvn:4EnLB383BSiF4KxW3v6ay/B/3v4ISVn
                                                                                                                                                                                          MD5:DE2A484508615D7C1377522AFF03E16C
                                                                                                                                                                                          SHA1:C27C0D10E7667AD95FFF731B4E45B2C6E665CC36
                                                                                                                                                                                          SHA-256:563450A38DB6C6A1911BC04F4F55B816910B3E768B1465A69F9B3BD27292DBEE
                                                                                                                                                                                          SHA-512:A360B0FD7E36BCC0FB4603D622C36199E5D4C705396C6701F29730EB5CB33D81B208541CADFAED5303FC329C7C6A465D23CA9584F0DEC2DE128E258478DD6661
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_HK AM "AM".. ::msgcat::mcset en_HK PM "PM".. ::msgcat::mcset en_HK DATE_FORMAT "%B %e, %Y".. ::msgcat::mcset en_HK TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset en_HK DATE_TIME_FORMAT "%B %e, %Y %l:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):286
                                                                                                                                                                                          Entropy (8bit):4.833246107458447
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoK6qyFjoKi+3vLjoKi+3v6mjoKv+3vnFDoAkvn:4EnLB383CqW13vJ3v6b3v9dmn
                                                                                                                                                                                          MD5:57F0BBE1316D14BC41D0858902A7980A
                                                                                                                                                                                          SHA1:B68BF99A021B9F01FE69341DF06F5D1453156A97
                                                                                                                                                                                          SHA-256:9E0DCEE86A03B7BDD831E0008868A9B874C506315BF01DF3982AD3813FD3BA8E
                                                                                                                                                                                          SHA-512:864F32254AAD39859AFC47D0C90DC5F38CA86EF0BBC7DE61BE253756C22B7806E616B59802C4F4D7B2F5543BF7C070FFF6FAF253E0A337EC443337E63A2E5A57
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_IE DATE_FORMAT "%d/%m/%y".. ::msgcat::mcset en_IE TIME_FORMAT "%T".. ::msgcat::mcset en_IE TIME_FORMAT_12 "%T".. ::msgcat::mcset en_IE DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):318
                                                                                                                                                                                          Entropy (8bit):4.80637980762728
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoKr3ujoKrGtoKr5vMoKrw3v1oKr5o+3voAsvn:4EnLB383T9xvT3vJF3vonn
                                                                                                                                                                                          MD5:1A54E506E70B2125C6016B373D3DD074
                                                                                                                                                                                          SHA1:15289902BAA93208D8FB224E119166D0E044E34E
                                                                                                                                                                                          SHA-256:ADEA3A1AB8AA84237DDB2F276ABDB96DCB4C51932E920D1A5E336904E1138664
                                                                                                                                                                                          SHA-512:0D663233E6C96515713B3B829B605E72D8CE581AEF1C02FF6CA96598C040DCA42A3AC765EE9B5002E8969A331EB19A9AF0F8215F7113D0AD2F2EB2C560239D53
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_IN AM "AM".. ::msgcat::mcset en_IN PM "PM".. ::msgcat::mcset en_IN DATE_FORMAT "%d %B %Y".. ::msgcat::mcset en_IN TIME_FORMAT "%H:%M:%S".. ::msgcat::mcset en_IN DATE_TIME_FORMAT "%d %B %Y %H:%M:%S %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):307
                                                                                                                                                                                          Entropy (8bit):4.939458132662909
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoyejbmvFjo63v1o63v6p6HyFjoy7+3vjb0ysvn:4EnLB383temdj3vd3v6QS1S3ven
                                                                                                                                                                                          MD5:7E81708F107658FFD31C3BFBF704A488
                                                                                                                                                                                          SHA1:7941ED040707591B68581337F8D90FA03C5E1406
                                                                                                                                                                                          SHA-256:EC305B7CB393421E6826D8F4FEA749D3902EBA53BFA488F2B463412F4070B9ED
                                                                                                                                                                                          SHA-512:8F038FF960F81D96FF9E3454D8ABDA7FFDA5B99DA304ACECC42E74DDBED839388246F66B58928DA902D3B475FBA46602B34F6829A87ECB1124FFC47C036B4DBE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_NZ DATE_FORMAT "%e/%m/%Y".. ::msgcat::mcset en_NZ TIME_FORMAT "%H:%M:%S".. ::msgcat::mcset en_NZ TIME_FORMAT_12 "%I:%M:%S %P %z".. ::msgcat::mcset en_NZ DATE_TIME_FORMAT "%e/%m/%Y %H:%M:%S %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):329
                                                                                                                                                                                          Entropy (8bit):4.824360175945298
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoojoOo2e4soe3v6ay/5o27+3v4x6HyFvn:4EnLB38304u3v6ay/k3v4ISVn
                                                                                                                                                                                          MD5:E2E3BD806C20D7FB88109B7F3B84C072
                                                                                                                                                                                          SHA1:2D7AD6BECA9C4D611BAE9747AD55A3E9385C2B42
                                                                                                                                                                                          SHA-256:3A9C22B07906544C04F7A29B800FCE87C09D7FDF5C251236925115CF251A3890
                                                                                                                                                                                          SHA-512:B14756B59BCABF8B29B41AC688E4F3A011735AF190B88F88B7B5FDDD3DA77F63FFC0F7875B3B453729CD3BC65E79F75F6E632CA68952EF473F78337D89E80BF2
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_PH AM "AM".. ::msgcat::mcset en_PH PM "PM".. ::msgcat::mcset en_PH DATE_FORMAT "%B %e, %Y".. ::msgcat::mcset en_PH TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset en_PH DATE_TIME_FORMAT "%B %e, %Y %l:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.911413468674953
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoQW53FuoQGuX3v6ZwoQWa+3v3F0fxvn:4EnLB383V83FOJ3v62c3v3FEn
                                                                                                                                                                                          MD5:F70245D73BE985091459ADF74B089EBC
                                                                                                                                                                                          SHA1:21D52C336C08526D9DCF1AEC1F0701CB8B073D7A
                                                                                                                                                                                          SHA-256:D565679AE9AACBFE3B5273FE29BD46F46FFBB63C837D7925C11356D267F5FF82
                                                                                                                                                                                          SHA-512:171C70EB10D5E6421A55CE9B1AE99763E23FB6A6F563F69FE099D07C07FCA0CF8D3F6F00C5BB38BFF59A5F4C311506C4A9593F86C12B3B9E1861E72656B3800B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_SG DATE_FORMAT "%d %b %Y".. ::msgcat::mcset en_SG TIME_FORMAT_12 "%P %I:%M:%S".. ::msgcat::mcset en_SG DATE_TIME_FORMAT "%d %b %Y %P %I:%M:%S %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):251
                                                                                                                                                                                          Entropy (8bit):4.937431055623088
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoOr0lIZoOK3v6poOs+3v0l6Uvn:4EnLB383z+3v6R3vl2n
                                                                                                                                                                                          MD5:FCA7B13CA6C9527D396A95BEA94CC92D
                                                                                                                                                                                          SHA1:E6F338A08F72DA11B97F70518D1565E6EF9AD798
                                                                                                                                                                                          SHA-256:67C253E2A187AA814809418E5B7A21F3A1F9FB5073458A59D80290F58C6C1EB4
                                                                                                                                                                                          SHA-512:37B8B4EA24B1C77AF0252A17660650CB2D4F8BB55C75817D6A94E1B81A3DDEF9913D12D3BF80C7BFE524CD0AD84E353E73238056759E6545BFE69EF5F806B8B7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_ZA DATE_FORMAT "%Y/%m/%d".. ::msgcat::mcset en_ZA TIME_FORMAT_12 "%I:%M:%S".. ::msgcat::mcset en_ZA DATE_TIME_FORMAT "%Y/%m/%d %I:%M:%S %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.934659260313229
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoEmGMoEs6W3v6ay/5oEmT+3vR6HyFvn:4EnLB383Zr0s6W3v6ay/ZJ3voSVn
                                                                                                                                                                                          MD5:A302091F490344B7A79C9463480AD7CF
                                                                                                                                                                                          SHA1:E3992D665077177BAD5A4771F1BAF52C2AD1829C
                                                                                                                                                                                          SHA-256:6F4754CE29DFA4F0E7957923249151CE8277395D1AF9F102D61B185F85899E4E
                                                                                                                                                                                          SHA-512:FEBDB0BD6D0FD4C592DB781836F93F0C579399D324112F8829B769303CC6EEA487AAB14EBD60ED1B4F3B3DABF501601C9F65656327FF54853BF2CD9EC6A2F00F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset en_ZW DATE_FORMAT "%d %B %Y".. ::msgcat::mcset en_ZW TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset en_ZW DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1285
                                                                                                                                                                                          Entropy (8bit):4.3537859241297845
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83dRb4vyomrIsmZ55vrAO0LH+50ydAcveva:43PT5rWvrAR60yW6oa
                                                                                                                                                                                          MD5:D87605E6282713EED41D56D53B7A04FD
                                                                                                                                                                                          SHA1:41AAD4BD3B72CCBB6A762FEED3C24931642DD867
                                                                                                                                                                                          SHA-256:98D52CAB5CA65789D1DC37949B65BAF0272AB87BCCBB4D4982C3AF380D5406AB
                                                                                                                                                                                          SHA-512:4A4F51B2FD0248B52530B5D9FE6BFCFE455147CBE2C1F073804A53666945405F89CBBAD219FFF6904C1F92885F7C53B9D9A969732D662CEA8EC1717B3303B294
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset eo DAYS_OF_WEEK_ABBREV [list \.. "di"\.. "lu"\.. "ma"\.. "me"\.. "\u0135a"\.. "ve"\.. "sa"].. ::msgcat::mcset eo DAYS_OF_WEEK_FULL [list \.. "diman\u0109o"\.. "lundo"\.. "mardo"\.. "merkredo"\.. "\u0135a\u016ddo"\.. "vendredo"\.. "sabato"].. ::msgcat::mcset eo MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "maj"\.. "jun"\.. "jul"\.. "a\u016dg"\.. "sep"\.. "okt"\.. "nov"\.. "dec"\.. ""].. ::msgcat::mcset eo MONTHS_FULL [list \.. "januaro"\.. "februaro"\.. "marto"\.. "aprilo"\.. "majo"\.. "junio"\.. "julio"\.. "a\u016dgusto"\.. "septembro"\.. "oktobro"\.. "novembro"\.. "decembro"\.. ""].. ::m
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1232
                                                                                                                                                                                          Entropy (8bit):4.2910064237800025
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83hEVIhlp4herIsYoorrClH+Fo9ARhprBvtFvr6:43OVY7+ercrmsYsr1thr6
                                                                                                                                                                                          MD5:91DE6EE8E1A251EF73CC74BFB0216CAC
                                                                                                                                                                                          SHA1:1FB01E3CF2CAFA95CC451BC34AB89DC542BBD7DD
                                                                                                                                                                                          SHA-256:E9A6FE8CCE7C808487DA505176984D02F7D644425934CEDB10B521FE1E796202
                                                                                                                                                                                          SHA-512:46CFD80E68461F165EE6A93AB6B433E4D4DA6A9A76CB7F3EF5766AC67567A7AFFB7B4E950A5AFA7C69C91F72AC82D2A448D32E39BBFC0BF26D2257460471EEC1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es DAYS_OF_WEEK_ABBREV [list \.. "dom"\.. "lun"\.. "mar"\.. "mi\u00e9"\.. "jue"\.. "vie"\.. "s\u00e1b"].. ::msgcat::mcset es DAYS_OF_WEEK_FULL [list \.. "domingo"\.. "lunes"\.. "martes"\.. "mi\u00e9rcoles"\.. "jueves"\.. "viernes"\.. "s\u00e1bado"].. ::msgcat::mcset es MONTHS_ABBREV [list \.. "ene"\.. "feb"\.. "mar"\.. "abr"\.. "may"\.. "jun"\.. "jul"\.. "ago"\.. "sep"\.. "oct"\.. "nov"\.. "dic"\.. ""].. ::msgcat::mcset es MONTHS_FULL [list \.. "enero"\.. "febrero"\.. "marzo"\.. "abril"\.. "mayo"\.. "junio"\.. "julio"\.. "agosto"\.. "septiembre"\.. "octubre"\.. "noviembre"\.. "diciembre"\.. ""].. ::msgc
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):248
                                                                                                                                                                                          Entropy (8bit):4.878377455979812
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xo8GzvFjot/W3v1o8T+3v9ysvn:4EnLB3833GzdV3vLK3vnn
                                                                                                                                                                                          MD5:313966A7E4F50BB77996FDE45E342CA9
                                                                                                                                                                                          SHA1:021DF7211DAE9A635D52F7005672C157DBBAE182
                                                                                                                                                                                          SHA-256:B97DCEA4FEC3E14632B1511D8C4F9E5A157D97B4EBBC7C6EE100C3558CB2947F
                                                                                                                                                                                          SHA-512:79DCC76263310523BAF1100C70918FCE6BECB47BE360E4A26F11C61F27E14FC28B588A9253AA0C1F08F45AE8A03312A30FBDCF4FDFFDC5BF9D086C4B539DE022
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_AR DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset es_AR TIME_FORMAT "%H:%M:%S".. ::msgcat::mcset es_AR DATE_TIME_FORMAT "%d/%m/%Y %H:%M:%S %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.924579610789789
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoYePWWjoU3v6ry/5oY7+3vPUe6HyFvn:4EnLB383nedh3v6ry/nS3vs3SVn
                                                                                                                                                                                          MD5:EF58B1097A3C6F2133BD7AA8CCC1AD1B
                                                                                                                                                                                          SHA1:BD479E4635F3CD70A6A90E07B7E92757BC9E2687
                                                                                                                                                                                          SHA-256:B47F55539DB6F64304DEA080D6F9A39165F1B9D4704DCBA4C182DBD3AA31A11B
                                                                                                                                                                                          SHA-512:F9EB1489E5002200D255A45DC57132DEFD2A2C6DE5BC049D0D9720575E4FDD1B6A212D9E15974C6A2E0D0886069EA0DD967AD7C20845EC38EB74CBED0C3E5BE1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_BO DATE_FORMAT "%d-%m-%Y".. ::msgcat::mcset es_BO TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_BO DATE_TIME_FORMAT "%d-%m-%Y %I:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.9352990174129925
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xodvPWWjok3v6ry/5odo+3vPUe6HyFvn:4EnLB383OdV3v6ry/i3vs3SVn
                                                                                                                                                                                          MD5:42BCE0EE3A3F9E9782E5DE72C989903A
                                                                                                                                                                                          SHA1:0960646417A61E8C31D408AE00B36A1284D0300E
                                                                                                                                                                                          SHA-256:9D1A2A6EBA673C6F6D964DBCDDF228CB64978F282E70E494B60D74E16A1DB9CB
                                                                                                                                                                                          SHA-512:C53DDCC17F261CFFAA2205879A131CFD23A7BCF4D3787090A0EA8D18530C4805903ED6CF31B53A34C70510A314EBBB68676E9F128289B42C5EFBC701405D5645
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_CL DATE_FORMAT "%d-%m-%Y".. ::msgcat::mcset es_CL TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_CL DATE_TIME_FORMAT "%d-%m-%Y %I:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.908553844782894
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xo4FjbmvFjo4F+3v6ry/5o4++3vjb0f6HyFvn:4EnLB3831mdD+3v6ry/P3vbSVn
                                                                                                                                                                                          MD5:6A8F31AE734DCEE4845454408CDB3BC5
                                                                                                                                                                                          SHA1:A3B9A0124D3CFA9E0E5957612897B23193AD5D59
                                                                                                                                                                                          SHA-256:5FAC53ACFB305C055AFD0BA824742A78CB506046B26DAC21C73F0BB60C2B889A
                                                                                                                                                                                          SHA-512:188A65CFE2FBD04D83F363AEA166F224137C8A7009A9EBEB24B2A9AC89D9484D3A7109A4CE08F5C0A28911D81571230CC37554F4F19956AE163F9304911EE53C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_CO DATE_FORMAT "%e/%m/%Y".. ::msgcat::mcset es_CO TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_CO DATE_TIME_FORMAT "%e/%m/%Y %I:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.919346233482604
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xo76GzvFjoTW3v6ry/5o76T+3v9f6HyFvn:4EnLB383K6Gzdj3v6ry/K6K3vMSVn
                                                                                                                                                                                          MD5:2EDDA3F61BA4D049E6C871D88322CF72
                                                                                                                                                                                          SHA1:40AFB64AF810596FCBDBD742ACAFE25CE56F3949
                                                                                                                                                                                          SHA-256:A33DC22330D087B8567670B4915C334FF1741EE03F05D616CC801ECFDA1D9E64
                                                                                                                                                                                          SHA-512:B6A6059B44F064C5CB59A3DAFAA7BE9064EE3E38F5FA6391017D931EF3A2B471DC4D556B7BEC6852FD1F6260EF17F476754D6BEA89E035748E9304977513CFB5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_CR DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset es_CR TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_CR DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.913083040975068
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xomerQZ2jou3v6ry/5om7+3vrQZg6HyFvn:4EnLB383sk4/3v6ry/s3vkrSVn
                                                                                                                                                                                          MD5:76CFD4F568EA799F9A4082865633FF97
                                                                                                                                                                                          SHA1:B09846BBF7A78243A5075F2DC9241791DCBA434B
                                                                                                                                                                                          SHA-256:8DC2F857E91912ED46A94EB6B37DD6170EA7BCDDCD41CB85C0926A74EE12FCC1
                                                                                                                                                                                          SHA-512:58B20A8A5D1F8C19AC36E61965106266B7E6F7E95DDD6AD9C4BB9FD7FFC561CB0E2103639D901A6A78CE2DD154CBF7F3AE0F71B4DC1CCB11DC6BB40D9C6E2157
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_DO DATE_FORMAT "%m/%d/%Y".. ::msgcat::mcset es_DO TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_DO DATE_TIME_FORMAT "%m/%d/%Y %I:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.915857529388286
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xozgzvFjoro+3v6ry/5oz9+3v9f6HyFvn:4EnLB383OgzdkF3v6ry/OI3vMSVn
                                                                                                                                                                                          MD5:94B713B1560FE7711EA746F1CEBD37CD
                                                                                                                                                                                          SHA1:E7047E8F04D731D38FA328FBC0E1856C4A8BB23D
                                                                                                                                                                                          SHA-256:52AB5A6C9DD4F130A75C049B3AF8F54B84071FC190374BCCF5FA0E1F3B91EB21
                                                                                                                                                                                          SHA-512:EE807D4D74A609F642CC3C6FC3D736708F67A6931DEB95288AB5822DA256BE4C908A346036195CF4266408458906D28BB5C715EEAFCACFC4FE45D4E6D8E435FE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_EC DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset es_EC TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_EC DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.9102355704853435
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xohvjbmvFjoI3v6ry/5oho+3vjb0f6HyFvn:4EnLB383KmdJ3v6ry/W3vbSVn
                                                                                                                                                                                          MD5:761D0A468DF2EE75BC2CAB09D5FF38CD
                                                                                                                                                                                          SHA1:D627BE45FE71CCB3CA53153393C075FF5136C2F3
                                                                                                                                                                                          SHA-256:19B4D3025156C060A16328370A3FDB9F141298DECFC8F97BE606F6438FECE2EE
                                                                                                                                                                                          SHA-512:6CF7C9004A8A3B70495862B7D21921B1A6263C2153FEBC5C4997366498ABBFE70263B436C2B4998550780A4C3A58DCF0AAE7420FF9D414323D731FA44BD83104
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_GT DATE_FORMAT "%e/%m/%Y".. ::msgcat::mcset es_GT TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_GT DATE_TIME_FORMAT "%e/%m/%Y %I:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.947925914291734
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoIvriSFjoP3v6ry/5oIo+3vrig6HyFvn:4EnLB383V+2m3v6ry/v3v+lSVn
                                                                                                                                                                                          MD5:33CEE7F947A484B076F5FA7871A30FEB
                                                                                                                                                                                          SHA1:F77F8D1F42008770A6FF1F5097C863ECF482BEBE
                                                                                                                                                                                          SHA-256:07873D4D59BB41000706A844859C73D26B1FF794058AA83CFFCA804981A24038
                                                                                                                                                                                          SHA-512:EBF6873F9CB554489EFCD352943100C00171E49D27153769D1C4DB25E2D1F44F2D34869B596C267C9BB59ED0444468D9982137CFB1C6035FB15A855BB867133B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_HN DATE_FORMAT "%m-%d-%Y".. ::msgcat::mcset es_HN TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_HN DATE_TIME_FORMAT "%m-%d-%Y %I:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.9102355704853435
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoPjbmvFjoH+3v6ry/5oI+3vjb0f6HyFvn:4EnLB383UmdD3v6ry/k3vbSVn
                                                                                                                                                                                          MD5:678D7A6DC32355246BF3AC485A24AF4D
                                                                                                                                                                                          SHA1:B6C273D3BE5FB9F5A221B0333870CCE41CEDFDE4
                                                                                                                                                                                          SHA-256:A0F57137D2C0ABDC933E03CFB188F5632176C195CEADB9DC80D469C8DC6CEDC6
                                                                                                                                                                                          SHA-512:571404CCB0591C681C975E3F7A6C6972FAF2362F1D48BFC95E69A9EAE2DB3F40BF4B666C41950C4924E3FD820C61ED91204F92283B8554F1BD35B64D53BD4125
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_MX DATE_FORMAT "%e/%m/%Y".. ::msgcat::mcset es_MX TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_MX DATE_TIME_FORMAT "%e/%m/%Y %I:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.918215906418583
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoe/GriSFjo3W3v6ry/5oe/T+3vrig6HyFvn:4EnLB383Re+2eW3v6ry/RS3v+lSVn
                                                                                                                                                                                          MD5:471C41907CE5DB1F30C647A789870F78
                                                                                                                                                                                          SHA1:C575A639609620AF7C56430991D0E4C2B50BDEC5
                                                                                                                                                                                          SHA-256:6250663DA1378E54BEDCEF206583D212BC0D61D04D070495238D33715BB20CAE
                                                                                                                                                                                          SHA-512:CAE32DF8F583542CAFE3292501725D85B697A5C1F9A0A7993490E8A69B6CE5CE3DE3AA2733B14D989A8D13B5E31B437DB42E9AB9D1851FE72313592C752B5061
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_NI DATE_FORMAT "%m-%d-%Y".. ::msgcat::mcset es_NI TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_NI DATE_TIME_FORMAT "%m-%d-%Y %I:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.906719336603863
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoX5rQZ2joHE3v6ry/5oXa+3vrQZg6HyFvn:4EnLB383ak4F3v6ry/G3vkrSVn
                                                                                                                                                                                          MD5:571F6716293442672521F70854A5AD05
                                                                                                                                                                                          SHA1:525EBDEA6F85FC769B6C0C0B179BD98381647123
                                                                                                                                                                                          SHA-256:EBB661C1C09E7D4F6FBCC4B2DAD0F41442B1FFDD27F003ABDC0375DD316E57D7
                                                                                                                                                                                          SHA-512:C6176EE48515BDFC09B8347DAC5FD2C0165AA765916457DC7B057E526785AC912481CB72F118D2943372213B23CE3C39739263C2B3DA4DBFEB24C522ACC0439D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_PA DATE_FORMAT "%m/%d/%Y".. ::msgcat::mcset es_PA TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_PA DATE_TIME_FORMAT "%m/%d/%Y %I:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.90959433688075
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoIgzvFjoQ9X3v6ry/5oI9+3v9f6HyFvn:4EnLB383+zdB3v6ry/y3vMSVn
                                                                                                                                                                                          MD5:5A5997D834DDD3E2E8FF8C6956AD54AC
                                                                                                                                                                                          SHA1:AB4110E37B3665D738A8F2B3E64CBA9E99127301
                                                                                                                                                                                          SHA-256:90C130B66958CF63CB3DDD2C633E58444357DBAB44C56831DD794CBD2EB1AED0
                                                                                                                                                                                          SHA-512:1FEB8E77EA7B886E4A06279AC8A4B6200DBB86DCD28989651B92A0C9147A7BCFBB871DF8F904A1CF8F869BFFBD21325505AC44A4DBEBE1EFC87D43174597F1F3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_PE DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset es_PE TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_PE DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.905689521403511
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xo06GriSFjoeW3v6ry/5o06T+3vrig6HyFvn:4EnLB383gG+263v6ry/gK3v+lSVn
                                                                                                                                                                                          MD5:CE811BB8D12C7E6D53338759CCFB0A22
                                                                                                                                                                                          SHA1:0AED290AA479DE6887CCB58D3F0A0F379EF8D558
                                                                                                                                                                                          SHA-256:F790E8E48DC079DCD7DEB58170561006A31294F7E4ACBF9CF2ABFA3DB9E3FA9E
                                                                                                                                                                                          SHA-512:0C73654CC3D33F76D9BF545BD6C5E42CBDD10B6D9750BFD6536806010F3B6A3C3647FB9D5E7E75A39823FDB857E13D07B7F987809C94B9F980E6D3A6D3108E85
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_PR DATE_FORMAT "%m-%d-%Y".. ::msgcat::mcset es_PR TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_PR DATE_TIME_FORMAT "%m-%d-%Y %I:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.917539255090736
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xo/5zvFjovE3v6ry/5o/a+3v9f6HyFvn:4EnLB383Czdt3v6ry/+3vMSVn
                                                                                                                                                                                          MD5:9CD6FAC4121E3D287C87157142E32845
                                                                                                                                                                                          SHA1:3081FE2197017EC8E052756A407880C1C4ED026A
                                                                                                                                                                                          SHA-256:70263F7EB22822DFEE8849B7AC4418ED9331275A71E77236B59226396505CDFF
                                                                                                                                                                                          SHA-512:25DC054085C4078734988EEDD87E31ABE93DA8B43512E924DE4BCDE9F8EC670436B72FAD1855484F9AC71DD0BEDD9ED30304D02219C4FFC4B0516D8889BDF9F9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_PY DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset es_PY TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_PY DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.929035824905457
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xofriSFjo3+3v6ry/5oY+3vrig6HyFvn:4EnLB383Y+22+3v6ry/Q3v+lSVn
                                                                                                                                                                                          MD5:AF300EA6E733DC6820768EA16194B472
                                                                                                                                                                                          SHA1:7766A6EB3D07BCC759CF6718EF3D6EC3FCE13565
                                                                                                                                                                                          SHA-256:26A38B3745C95673D21BABB987F1D41EE08DDA945C670F5432BA0CE6F893C0E9
                                                                                                                                                                                          SHA-512:C38D67C912584BE539D71881C6517AC186CBB336A160602DA716CE2708B2D38CE8FA7DD23EDB98890ABB7119B924B6C7816C18EC18F20C49D6284DF2386E32EE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_SV DATE_FORMAT "%m-%d-%Y".. ::msgcat::mcset es_SV TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_SV DATE_TIME_FORMAT "%m-%d-%Y %I:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.923802447598272
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xooygzvFjooq9X3v6ry/5ooy9+3v9f6HyFvn:4EnLB3835rzdbsX3v6ry/5J3vMSVn
                                                                                                                                                                                          MD5:2DC550FEC3F477B1159B824479BCE707
                                                                                                                                                                                          SHA1:4D0B20CF3E50B64D74655A405A7750E0B0BB4375
                                                                                                                                                                                          SHA-256:1291B58810739EA0651493DD7887F5EE3E14BDB806E06DD4BB8AE2520C742EDA
                                                                                                                                                                                          SHA-512:B12B927ACA6274904928A6A6CAEC8339A794C74A1F1804FF93AABC132AF9AD8AC5117F20067A60EFEBC9887150D7ACA5BE9643FF61509666011FD203211C25B9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_UY DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset es_UY TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_UY DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.928484426267027
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoXrzvFjoXK3v6ry/5oXs+3v9f6HyFvn:4EnLB3838zdv3v6ry/c3vMSVn
                                                                                                                                                                                          MD5:184D6C4B9F0AA874DEB959F63F7CC01B
                                                                                                                                                                                          SHA1:5FB370B498289590C977F6B489FF646F0FB27425
                                                                                                                                                                                          SHA-256:91191517403C712299919F9C797F952502E33CB6961D1DBEE3A7C9E8D2B170B9
                                                                                                                                                                                          SHA-512:881CCAB0950AE993744ECCA141120C005F53D684167A3E5CBDDF950D110D630FB2B4F6AE6E3D0E06D5110AE25EA00A4F4DAFB03AD3B227DC8C63464D434431DA
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset es_VE DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset es_VE TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset es_VE DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1258
                                                                                                                                                                                          Entropy (8bit):4.391217201307309
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83P1Y2+1YoQVTsC/m48qpRTVTR7I/68qqq4Z0yoN7emG5wsvtqmsv5t:43P1p+1jQ9sq8y9v8Yko7emG5wKtqmKX
                                                                                                                                                                                          MD5:C8C5EF2FA6DD8DBD5BBD2699BE1A0BF6
                                                                                                                                                                                          SHA1:F5E26B40786B8987C98F9CBDEF5522043574A9ED
                                                                                                                                                                                          SHA-256:4BEE224C21B0483CFF39BE145C671AA20CB7872C8727FD918C0E8ECA2BBEB172
                                                                                                                                                                                          SHA-512:757FA85C137A11C1A3F4A8392C7A4E4030A67D0E593FA25A98BEC07DB295399AB2C0D9EBE61E07420B14387A29C060DC3AF812A1E7B85110DBB13C3C3DCB3600
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset et DAYS_OF_WEEK_ABBREV [list \.. "P"\.. "E"\.. "T"\.. "K"\.. "N"\.. "R"\.. "L"].. ::msgcat::mcset et DAYS_OF_WEEK_FULL [list \.. "p\u00fchap\u00e4ev"\.. "esmasp\u00e4ev"\.. "teisip\u00e4ev"\.. "kolmap\u00e4ev"\.. "neljap\u00e4ev"\.. "reede"\.. "laup\u00e4ev"].. ::msgcat::mcset et MONTHS_ABBREV [list \.. "Jaan"\.. "Veebr"\.. "M\u00e4rts"\.. "Apr"\.. "Mai"\.. "Juuni"\.. "Juuli"\.. "Aug"\.. "Sept"\.. "Okt"\.. "Nov"\.. "Dets"\.. ""].. ::msgcat::mcset et MONTHS_FULL [list \.. "Jaanuar"\.. "Veebruar"\.. "M\u00e4rts"\.. "Aprill"\.. "Mai"\.. "Juuni"\.. "Juuli"\.. "August"\.. "September"\.. "Oktoober"\.. "November"\.. "De
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1032
                                                                                                                                                                                          Entropy (8bit):4.002617252503668
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83DEXk8TT7vXk8TTMtzCIsOo/ssP6tvf1I49sHT:434bTbbTc+RjKi4mz
                                                                                                                                                                                          MD5:ED9805AF5BFB54EB28C6CB3975F86F5B
                                                                                                                                                                                          SHA1:2BD91BD850028712F35A2DDB2555036FBF6E8114
                                                                                                                                                                                          SHA-256:6889B57D29B670C6CFB7B5A3F2F1749D12C802E8E9629014D06CE23C034C7EF1
                                                                                                                                                                                          SHA-512:16F31DE5D2B0D3ED2D975C7891C73C48F073CDAC28F17572FC9424C2D384DDFE9E5E235F17C788F42840CB2D819D2D9499B909AB80FEF1B09F2AE1627CF1DADC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset eu DAYS_OF_WEEK_ABBREV [list \.. "igandea"\.. "astelehena"\.. "asteartea"\.. "asteazkena"\.. "osteguna"\.. "ostirala"\.. "larunbata"].. ::msgcat::mcset eu DAYS_OF_WEEK_FULL [list \.. "igandea"\.. "astelehena"\.. "asteartea"\.. "asteazkena"\.. "osteguna"\.. "ostirala"\.. "larunbata"].. ::msgcat::mcset eu MONTHS_ABBREV [list \.. "urt"\.. "ots"\.. "mar"\.. "api"\.. "mai"\.. "eka"\.. "uzt"\.. "abu"\.. "ira"\.. "urr"\.. "aza"\.. "abe"\.. ""].. ::msgcat::mcset eu MONTHS_FULL [list \.. "urtarrila"\.. "otsaila"\.. "martxoa"\.. "apirila"\.. "maiatza"\.. "ekaina"\.. "uztaila"\.. "abuztua"\.. "iraila"\.. "urria"\.. "azaroa"\..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):294
                                                                                                                                                                                          Entropy (8bit):4.915392589807169
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoszFnJF+l6VvBoszw3vLjoszw3v6mjosz++3v/RHvn:4EnLB383FL+l6VQ3vO3v6G3vZPn
                                                                                                                                                                                          MD5:4C91AA000D4316585893025CBB96E910
                                                                                                                                                                                          SHA1:3D4E73839A1A8CB9DEC1E59D9D2813257D9480F0
                                                                                                                                                                                          SHA-256:D45CC432E5743E6CEC34E9A1E0F91A9D5C315CDA409E0826B51AD9D908479EB6
                                                                                                                                                                                          SHA-512:0731F2EEB22ADC7EF8AF215B9EB4C5A66B33BC90E4F80CF7AA482AD002CB30543547230124A0507EC79EDDD6903A042EDA5D7C8AFD77F7FC994EFC6853FABB05
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset eu_ES DATE_FORMAT "%a, %Yeko %bren %da".. ::msgcat::mcset eu_ES TIME_FORMAT "%T".. ::msgcat::mcset eu_ES TIME_FORMAT_12 "%T".. ::msgcat::mcset eu_ES DATE_TIME_FORMAT "%y-%m-%d %T %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1711
                                                                                                                                                                                          Entropy (8bit):4.21837106187395
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83CnMqnbxbGwgjSyiY/Xw2mS1yM/8ye48YyfNqTb2gyj/8yHkQp:43Yzyhgvs9yi4P
                                                                                                                                                                                          MD5:7AB25F4E7E457469DC61A33176B3AA72
                                                                                                                                                                                          SHA1:EEA98283D250A99E33DD4D5D9B1B76A029716CE6
                                                                                                                                                                                          SHA-256:86898728B275288693B200568DC927C3FF5B9050690876C4441A8339DAE06386
                                                                                                                                                                                          SHA-512:7524437F91E91751BEB7A378D7674C49E5D84B716FE962F4C23580C46A671F3F33638FCD37A8F90C86E24DA8F54448E06AC9C3AEFFB5613E94A04E512C1AD68D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fa DAYS_OF_WEEK_ABBREV [list \.. "\u06cc\u2214"\.. "\u062f\u2214"\.. "\u0633\u2214"\.. "\u0686\u2214"\.. "\u067e\u2214"\.. "\u062c\u2214"\.. "\u0634\u2214"].. ::msgcat::mcset fa DAYS_OF_WEEK_FULL [list \.. "\u06cc\u06cc\u200c\u0634\u0646\u0628\u0647"\.. "\u062f\u0648\u0634\u0646\u0628\u0647"\.. "\u0633\u0647\u200c\u0634\u0646\u0628\u0647"\.. "\u0686\u0647\u0627\u0631\u0634\u0646\u0628\u0647"\.. "\u067e\u0646\u062c\u200c\u0634\u0646\u0628\u0647"\.. "\u062c\u0645\u0639\u0647"\.. "\u0634\u0646\u0628\u0647"].. ::msgcat::mcset fa MONTHS_ABBREV [list \.. "\u0698\u0627\u0646"\.. "\u0641\u0648\u0631"\.. "\u0645\u0627\u0631"\.. "\u0622\u0648\u0631"\.. "\u0645\u0640\u0647"\.. "\u0698\u0648\u0646"\.. "\u0698\u0648\u06cc"\.. "\u0627\u0648\u062a
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2009
                                                                                                                                                                                          Entropy (8bit):4.491667766230948
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83KnMqnbxbGUgjDiY/Xw2mS1yM/8ye48tfNqTb2gyj/8yHkQLoRv9v/vNv0P:43wihgvsai4Rmv53JU
                                                                                                                                                                                          MD5:C59EE7CA80AD9F612A21C8B6674A820E
                                                                                                                                                                                          SHA1:AEFD631EFC1892063244FA622DE1A091C461E370
                                                                                                                                                                                          SHA-256:6B56545C1AE1DE53BC2389BB7AE59F115BADE24F907E384E079491DC77D6541D
                                                                                                                                                                                          SHA-512:42F52091480599D317FB80DF8E52A6C6F88614C6172BF4033974DD136FB30E6F47D38982C8A7BC14CF3165C3EBAE3680F94DF3A0ED079AB68165286251CD0BD7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fa_IN DAYS_OF_WEEK_ABBREV [list \.. "\u06cc\u2214"\.. "\u062f\u2214"\.. "\u0633\u2214"\.. "\u0686\u2214"\.. "\u067e\u2214"\.. "\u062c\u2214"\.. "\u0634\u2214"].. ::msgcat::mcset fa_IN DAYS_OF_WEEK_FULL [list \.. "\u06cc\u06cc\u200c\u0634\u0646\u0628\u0647"\.. "\u062f\u0648\u0634\u0646\u0628\u0647"\.. "\u0633\u0647\u200c\u0634\u0646\u0628\u0647"\.. "\u0686\u0647\u0627\u0631\u0634\u0646\u0628\u0647"\.. "\u067e\u0646\u062c\u200c\u0634\u0646\u0628\u0647"\.. "\u062c\u0645\u0639\u0647"\.. "\u0634\u0646\u0628\u0647"].. ::msgcat::mcset fa_IN MONTHS_ABBREV [list \.. "\u0698\u0627\u0646"\.. "\u0641\u0648\u0631"\.. "\u0645\u0627\u0631"\.. "\u0622\u0648\u0631"\.. "\u0645\u0640\u0647"\.. "\u0698\u0648\u0646"\.. "\u0698\u0648\u06cc"\.. "\u0627\u0
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):426
                                                                                                                                                                                          Entropy (8bit):5.12739029869254
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:4EnLB383D2WGz7A/3vy3v6TANCmK3vz7AAbn:4aR83DoPivkvFk5vPN
                                                                                                                                                                                          MD5:9778A7C3ABD37ECBEC0BB9715E52FAF8
                                                                                                                                                                                          SHA1:D8063CA7779674EB1D9FE3E4B4774DB20B93038B
                                                                                                                                                                                          SHA-256:3D9779C27E8960143D00961F6E82124120FD47B7F3CB82DB3DF21CDD9090C707
                                                                                                                                                                                          SHA-512:B90B4A96CE5E8B9BF512B98C406603C60EA00F6740D04CD1FC30810C7155A37851AE5E28716F959137806F1A9E3152D2A0D79B8EA7E681A0737A28593657DE66
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fa_IR AM "\u0635\u0628\u062d".. ::msgcat::mcset fa_IR PM "\u0639\u0635\u0631".. ::msgcat::mcset fa_IR DATE_FORMAT "%d\u2044%m\u2044%Y".. ::msgcat::mcset fa_IR TIME_FORMAT "%S:%M:%H".. ::msgcat::mcset fa_IR TIME_FORMAT_12 "%S:%M:%l %P".. ::msgcat::mcset fa_IR DATE_TIME_FORMAT "%d\u2044%m\u2044%Y %S:%M:%H %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1195
                                                                                                                                                                                          Entropy (8bit):4.32217771842326
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83KTvIhmuw4tW/UWJTttWKeqA+3ewvtyv3e6:43YvIwuw4t05ttnlzt0p
                                                                                                                                                                                          MD5:CC06F0ABD8F985654DAD8256598EBCB7
                                                                                                                                                                                          SHA1:71C880F9F395ACD32AF7F538033211F392F83645
                                                                                                                                                                                          SHA-256:9929A6B7139BD7E0F29487F7888A83E4C4F5E9CE0352738CFCA94EE2DDF3BD6B
                                                                                                                                                                                          SHA-512:E1292665270B6FBF7738CC3864B55194E7B827C6AD9492FB2E54DC1B626159B243052CE502335B9D92E2B8F58A4DD1FA0E628CB6A9D1D3A652FE2B93A3FB711A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fi DAYS_OF_WEEK_ABBREV [list \.. "su"\.. "ma"\.. "ti"\.. "ke"\.. "to"\.. "pe"\.. "la"].. ::msgcat::mcset fi DAYS_OF_WEEK_FULL [list \.. "sunnuntai"\.. "maanantai"\.. "tiistai"\.. "keskiviikko"\.. "torstai"\.. "perjantai"\.. "lauantai"].. ::msgcat::mcset fi MONTHS_ABBREV [list \.. "tammi"\.. "helmi"\.. "maalis"\.. "huhti"\.. "touko"\.. "kes\u00e4"\.. "hein\u00e4"\.. "elo"\.. "syys"\.. "loka"\.. "marras"\.. "joulu"\.. ""].. ::msgcat::mcset fi MONTHS_FULL [list \.. "tammikuu"\.. "helmikuu"\.. "maaliskuu"\.. "huhtikuu"\.. "toukokuu"\.. "kes\u00e4kuu"\.. "hein\u00e4kuu"\.. "elokuu"\.. "syyskuu"\.. "lokakuu"\.. "marraskuu"\..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1033
                                                                                                                                                                                          Entropy (8bit):4.15884265510429
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR834YPxTSBFSa+E6rIsmYmyAxyIQbXHU92W1T:43a6rIyAE0B
                                                                                                                                                                                          MD5:5D224E66FD9521CA4327D4F164CD6585
                                                                                                                                                                                          SHA1:FC8F4C1D9A69931679028DE02155D96A18F6542E
                                                                                                                                                                                          SHA-256:2EC9B03469FA38B260915C93318F446EA5E12B9090BD441936B57552EBA1E3C9
                                                                                                                                                                                          SHA-512:0E0F97D99F0274A8A92AA7DC992B252A0BB696D69A8835602D8F4C03A6A15780F45971F00863436949CD81AD7DF6EE6BC463CE5B9FECF5E39508BA4D4E83C693
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fo DAYS_OF_WEEK_ABBREV [list \.. "sun"\.. "m\u00e1n"\.. "t\u00fds"\.. "mik"\.. "h\u00f3s"\.. "fr\u00ed"\.. "ley"].. ::msgcat::mcset fo DAYS_OF_WEEK_FULL [list \.. "sunnudagur"\.. "m\u00e1nadagur"\.. "t\u00fdsdagur"\.. "mikudagur"\.. "h\u00f3sdagur"\.. "fr\u00edggjadagur"\.. "leygardagur"].. ::msgcat::mcset fo MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "mai"\.. "jun"\.. "jul"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "des"\.. ""].. ::msgcat::mcset fo MONTHS_FULL [list \.. "januar"\.. "februar"\.. "mars"\.. "apr\u00edl"\.. "mai"\.. "juni"\.. "juli"\.. "august"\.. "september"\.. "oktober"\.. "november"\..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):286
                                                                                                                                                                                          Entropy (8bit):4.864028070948858
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoZA4WjoZd3vLjoZd3v6mjoZd+3vnFDoAkvn:4EnLB3831P23vS3v6u3v9dmn
                                                                                                                                                                                          MD5:92E2B6483B2374817548F4EAA1731820
                                                                                                                                                                                          SHA1:071E1E9368CCB4EC864E78622B2113F460920203
                                                                                                                                                                                          SHA-256:C3DCCF5E5904C24D4AD9AAA36160A78F5397A7452510C0C0E61DE4DE863305CB
                                                                                                                                                                                          SHA-512:E79D4D38A22298252FA46D15C383CFB2A1E49E8196C265A58F9BA4982DFD9CE29E87C0B85BE3F39617359451831B792FCD3092A52EDF8FFD999AFE5CFE1D170D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fo_FO DATE_FORMAT "%d/%m-%Y".. ::msgcat::mcset fo_FO TIME_FORMAT "%T".. ::msgcat::mcset fo_FO TIME_FORMAT_12 "%T".. ::msgcat::mcset fo_FO DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1257
                                                                                                                                                                                          Entropy (8bit):4.383721663740675
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR835LzAX2t6KOkPwzZIGzRmzQf1waGqHvivh:43mlwIFZtA/qPkh
                                                                                                                                                                                          MD5:4D63B4A7CF13A28A6F6784B5597EEF43
                                                                                                                                                                                          SHA1:FE1B35A93CB72666D7D6BC37D9BE081B05A00CD9
                                                                                                                                                                                          SHA-256:96B1E1E12CD13A56722EBF27D362C70B467342FA1282A40B89FB16B5105A0480
                                                                                                                                                                                          SHA-512:5647CAE859B62C7CE1CEE6426A076361D2A29EFE6B6F311DDC0E7D006194BA68D575852FEC5FDE2AB43DF8AE440C57013D32A3951095CB856327070FD9BD1C76
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fr DAYS_OF_WEEK_ABBREV [list \.. "dim."\.. "lun."\.. "mar."\.. "mer."\.. "jeu."\.. "ven."\.. "sam."].. ::msgcat::mcset fr DAYS_OF_WEEK_FULL [list \.. "dimanche"\.. "lundi"\.. "mardi"\.. "mercredi"\.. "jeudi"\.. "vendredi"\.. "samedi"].. ::msgcat::mcset fr MONTHS_ABBREV [list \.. "janv."\.. "f\u00e9vr."\.. "mars"\.. "avr."\.. "mai"\.. "juin"\.. "juil."\.. "ao\u00fbt"\.. "sept."\.. "oct."\.. "nov."\.. "d\u00e9c."\.. ""].. ::msgcat::mcset fr MONTHS_FULL [list \.. "janvier"\.. "f\u00e9vrier"\.. "mars"\.. "avril"\.. "mai"\.. "juin"\.. "juillet"\.. "ao\u00fbt"\.. "septembre"\.. "octobre"\.. "novembre"\.. "d\u00e9cembre
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):286
                                                                                                                                                                                          Entropy (8bit):4.910112619660625
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoXqyFjoIX3vLjoIX3v6mjog+3vnFDoAkvn:4EnLB383AqWv3vL3v6d3v9dmn
                                                                                                                                                                                          MD5:07EEADB8C2F2425FF9A27E46A81827A2
                                                                                                                                                                                          SHA1:AA18A651C64098C7885F1F869B9F221453F42987
                                                                                                                                                                                          SHA-256:AAD828BCBB512FBD9902DCDD3812247A74913CC574DEB07DA95A7BBE74B1FE48
                                                                                                                                                                                          SHA-512:1FA60B1A69B2F5FD2C009EC18695A937C4484D7C418F7E8398D95723B857698143E0584A546F9032B75894730CBBEF78453061AC13D90199FF702E148D983C28
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fr_BE DATE_FORMAT "%d/%m/%y".. ::msgcat::mcset fr_BE TIME_FORMAT "%T".. ::msgcat::mcset fr_BE TIME_FORMAT_12 "%T".. ::msgcat::mcset fr_BE DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):286
                                                                                                                                                                                          Entropy (8bit):4.890376345610709
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xooIso13vLjo13v6mjo1+3vnFDoAkvn:4EnLB383vIF3vU3v6A3v9dmn
                                                                                                                                                                                          MD5:2F70BDDE7685E2892C5F79C632FC2F0F
                                                                                                                                                                                          SHA1:FD1A6F6042E59D1563ABB5858C348C1D785C435E
                                                                                                                                                                                          SHA-256:0624DF9A56723DDB89E59736C20A5837DEA2206A789EBE7EEF19AD287590CA45
                                                                                                                                                                                          SHA-512:50FC0C91AB2C75FFC4F100C0D42DFC4B2101DB9713FD77E6FF5BF3F25A0AF4A535A4709CF4586809CEEE76C25B66ABC0DD4FD61524510C57AA0E63EA8F46E8D5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fr_CA DATE_FORMAT "%Y-%m-%d".. ::msgcat::mcset fr_CA TIME_FORMAT "%T".. ::msgcat::mcset fr_CA TIME_FORMAT_12 "%T".. ::msgcat::mcset fr_CA DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):288
                                                                                                                                                                                          Entropy (8bit):4.913241133684606
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoFt28oF+3vLjoF+3v6mjo++3vnFDoAkvn:4EnLB383yte+3vs+3v6/3v9dmn
                                                                                                                                                                                          MD5:83FC7EBA68C3727F7C13C8EEAF79823F
                                                                                                                                                                                          SHA1:81C27F9B97F5F5190F7189230535EC09CD228158
                                                                                                                                                                                          SHA-256:290CA6EB74BAEAC4E2420D0755D148849F89EE87E37860F25CBB7B8AFA3EDCBC
                                                                                                                                                                                          SHA-512:35DA46558A246D7B3FAB02208001CE986E2E6DD88D6318AF743F4E81CA6920471D1425BB009A7476A79E7F61E1353C027B765331CD8EFA07A9E884DCB73F2195
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset fr_CH DATE_FORMAT "%d. %m. %y".. ::msgcat::mcset fr_CH TIME_FORMAT "%T".. ::msgcat::mcset fr_CH TIME_FORMAT_12 "%T".. ::msgcat::mcset fr_CH DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1188
                                                                                                                                                                                          Entropy (8bit):4.314271783103334
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR835k0CM/hlrXa754pD73/tKSx54pbIK5f2CA:43W05rXUa173/VadDA
                                                                                                                                                                                          MD5:67D137E5D853DB61A4B4264871E793F7
                                                                                                                                                                                          SHA1:4280E7F662DE792175AF8B4C93874F035F716F0F
                                                                                                                                                                                          SHA-256:880806867ACABD9B39E3029A5ADD26B690CC5709082D43B0959EBA725EA07AB5
                                                                                                                                                                                          SHA-512:C27B745143539D3E6D94BB754DCA35065CDE9B1AA6EE038D47F658175CFACC20236124D38BE5BBB03CAF8F613BD748C43CB8DFCC9234E915D18B5A477BAEF94E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ga DAYS_OF_WEEK_ABBREV [list \.. "Domh"\.. "Luan"\.. "M\u00e1irt"\.. "C\u00e9ad"\.. "D\u00e9ar"\.. "Aoine"\.. "Sath"].. ::msgcat::mcset ga DAYS_OF_WEEK_FULL [list \.. "D\u00e9 Domhnaigh"\.. "D\u00e9 Luain"\.. "D\u00e9 M\u00e1irt"\.. "D\u00e9 C\u00e9adaoin"\.. "D\u00e9ardaoin"\.. "D\u00e9 hAoine"\.. "D\u00e9 Sathairn"].. ::msgcat::mcset ga MONTHS_ABBREV [list \.. "Ean"\.. "Feabh"\.. "M\u00e1rta"\.. "Aib"\.. "Beal"\.. "Meith"\.. "I\u00fail"\.. "L\u00fan"\.. "MF\u00f3mh"\.. "DF\u00f3mh"\.. "Samh"\.. "Noll"\.. ""].. ::msgcat::mcset ga MONTHS_FULL [list \.. "Ean\u00e1ir"\.. "Feabhra"\.. "M\u00e1rta"\.. "Aibre\u00e1n"\.. "M\u00ed na Bealtaine"\.. "Meith"\..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):286
                                                                                                                                                                                          Entropy (8bit):4.824539027053997
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xobHAygDobHAqo+3vLjobHAqo+3v6mjobHAy9+3vnFDoAkv:4EnLB383p23vy3v6a3v9dmn
                                                                                                                                                                                          MD5:C27BD7F317AAADB380F4C38AE0D2FDA6
                                                                                                                                                                                          SHA1:79870A0E68AA0A9B301414EDC21889F83BB81E40
                                                                                                                                                                                          SHA-256:3F9615C617D3CDBC1E127B3EFEE785B0CB5E92E17B7DABAC80DA2BEAF076362C
                                                                                                                                                                                          SHA-512:3605B9A914284CF1D3CC90DF2F21A86C0472AEE59800942DC93D842C7AE164E1DA72813787F163DC80B72269D2C391953ABAD6A8B72CCF069BEE96D418A173E9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ga_IE DATE_FORMAT "%d.%m.%y".. ::msgcat::mcset ga_IE TIME_FORMAT "%T".. ::msgcat::mcset ga_IE TIME_FORMAT_12 "%T".. ::msgcat::mcset ga_IE DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):997
                                                                                                                                                                                          Entropy (8bit):4.120890519790248
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83okzalCcPdJ5rK8yzMY4JlV1ZDqqIkFo8w:43JkPj9K8y4HHZLIQtw
                                                                                                                                                                                          MD5:A3D098C1A47E380F7C25233A52FBDE38
                                                                                                                                                                                          SHA1:C97E4EAA9E7A7F99950F422B93C57134B532C639
                                                                                                                                                                                          SHA-256:34D61B49DBF9584893051FFB458D6DE9E7E2E7774AC0011F70C4DD4184EBA81C
                                                                                                                                                                                          SHA-512:4687AB3D2FAA65FED90678EBC08C074959E93A9FEFAF3D61EEE39DB08FD200CB57C0DDB4DDBF6451FE1EF5E07EA976EDEF830769FF403CE51734129CEF24DA9F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset gl DAYS_OF_WEEK_ABBREV [list \.. "Dom"\.. "Lun"\.. "Mar"\.. "M\u00e9r"\.. "Xov"\.. "Ven"\.. "S\u00e1b"].. ::msgcat::mcset gl DAYS_OF_WEEK_FULL [list \.. "Domingo"\.. "Luns"\.. "Martes"\.. "M\u00e9rcores"\.. "Xoves"\.. "Venres"\.. "S\u00e1bado"].. ::msgcat::mcset gl MONTHS_ABBREV [list \.. "Xan"\.. "Feb"\.. "Mar"\.. "Abr"\.. "Mai"\.. "Xu\u00f1"\.. "Xul"\.. "Ago"\.. "Set"\.. "Out"\.. "Nov"\.. "Dec"\.. ""].. ::msgcat::mcset gl MONTHS_FULL [list \.. "Xaneiro"\.. "Febreiro"\.. "Marzo"\.. "Abril"\.. "Maio"\.. "Xu\u00f1o"\.. "Xullo"\.. "Agosto"\.. "Setembro"\.. "Outubro"\.. "Novembro"\.. "Decembro"\.. ""]..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.886176304042503
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoPhkgMoPxsF3v6ay/5oPhk9+3vR6HyFvn:4EnLB383WrfK3v6ay/WJ3voSVn
                                                                                                                                                                                          MD5:78B9163C5E8E5E7049CBF91D1A5889A4
                                                                                                                                                                                          SHA1:F2F07AF3D79D61C8E0C73B13E2CA8266E10E396B
                                                                                                                                                                                          SHA-256:B5688CA07D713227B713655877710258CD503617E8DF79293A971649E3134F05
                                                                                                                                                                                          SHA-512:E86074B687670542CFA097C94D150292E1A73C9F231E92CD84386580A446569CC6F8F5817F46ED64A1D00F95D59F6F1F5D4B961DF3C8335938D83F3517794353
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset gl_ES DATE_FORMAT "%d %B %Y".. ::msgcat::mcset gl_ES TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset gl_ES DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1084
                                                                                                                                                                                          Entropy (8bit):4.213672208102291
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR832vTXAC2/fS5JfaCroeLaCAQbSm5qJe1:43QTXs32zrf
                                                                                                                                                                                          MD5:518FC3964D50854081FB79189A42D3E7
                                                                                                                                                                                          SHA1:59392F16CD56E3E6A685F78974D539FB3A972B98
                                                                                                                                                                                          SHA-256:404795F2C88D0038F9ED0B5120A251D26EDF8B236E1B1698BC71ACD4DC75AC45
                                                                                                                                                                                          SHA-512:E5C88CAB8741D631938CEC2E0959C0FE26685C395F5F9F4F1B5C9E146E84D23D897CD7A823AB46D4B62C590AE15EC76B87EB59308ACFB1BB6F61398890B43622
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset gv DAYS_OF_WEEK_ABBREV [list \.. "Jed"\.. "Jel"\.. "Jem"\.. "Jerc"\.. "Jerd"\.. "Jeh"\.. "Jes"].. ::msgcat::mcset gv DAYS_OF_WEEK_FULL [list \.. "Jedoonee"\.. "Jelhein"\.. "Jemayrt"\.. "Jercean"\.. "Jerdein"\.. "Jeheiney"\.. "Jesarn"].. ::msgcat::mcset gv MONTHS_ABBREV [list \.. "J-guer"\.. "T-arree"\.. "Mayrnt"\.. "Avrril"\.. "Boaldyn"\.. "M-souree"\.. "J-souree"\.. "Luanistyn"\.. "M-fouyir"\.. "J-fouyir"\.. "M.Houney"\.. "M.Nollick"\.. ""].. ::msgcat::mcset gv MONTHS_FULL [list \.. "Jerrey-geuree"\.. "Toshiaght-arree"\.. "Mayrnt"\.. "Averil"\.. "Boaldyn"\.. "Mean-souree"\.. "Jerrey-souree"\.. "Luanistyn"\.. "Mean-fouyir"\..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.936566750568767
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoQbtvMoQLE3v6ay/5oQbto+3vR6HyFvn:4EnLB383PbtvALE3v6ay/PbtF3voSVn
                                                                                                                                                                                          MD5:0B6BE614EF5F5F25A30D2D33701A9F94
                                                                                                                                                                                          SHA1:65800FBD73D9DAE550E04E1D818A6B9D1AEF86FE
                                                                                                                                                                                          SHA-256:86CABF3B9360C0E686CC4CBEB843E971C28BC6D35210ED378B54EB58CC41F3D5
                                                                                                                                                                                          SHA-512:376D21B38DA49A8F7C2983F2B808FD55AC9F6383BC66DF28DB99DBF61FDC9FFF8CD20F077EC3ED873EF47F0F613BDD9AD02DFFB1CB51F9A36715C7FC798C3B70
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset gv_GB DATE_FORMAT "%d %B %Y".. ::msgcat::mcset gv_GB TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset gv_GB DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1990
                                                                                                                                                                                          Entropy (8bit):4.298934047406144
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83Y71LCLxL0eCLbCLKCLaCLXL7CLB0p1dLGCoCLU5LT5Gv5LJ9p5LnLEHLGCh:43sl7KqpU/nNbhbOezd2ICn
                                                                                                                                                                                          MD5:A0E60036EB17208A449AAFC3AAAE622C
                                                                                                                                                                                          SHA1:9D7479BA85FBB00A2DF2B61F4ED2CBEA8F1EC8C3
                                                                                                                                                                                          SHA-256:787DA79AF58872BF45AB09E3B6A920A4496B5BD8A4F3C7F010CF013EC2E8EFE0
                                                                                                                                                                                          SHA-512:46D12C14B5736E5EA97EB728BF58999E9D7C2CF910D8F5AFA3F5D3A86329ABF41A3E2BEBD81EE4EF64BEA0DC173B77A9FE12471C1BD9D768ED552A55B3B80213
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset he DAYS_OF_WEEK_ABBREV [list \.. "\u05d0"\.. "\u05d1"\.. "\u05d2"\.. "\u05d3"\.. "\u05d4"\.. "\u05d5"\.. "\u05e9"].. ::msgcat::mcset he DAYS_OF_WEEK_FULL [list \.. "\u05d9\u05d5\u05dd \u05e8\u05d0\u05e9\u05d5\u05df"\.. "\u05d9\u05d5\u05dd \u05e9\u05e0\u05d9"\.. "\u05d9\u05d5\u05dd \u05e9\u05dc\u05d9\u05e9\u05d9"\.. "\u05d9\u05d5\u05dd \u05e8\u05d1\u05d9\u05e2\u05d9"\.. "\u05d9\u05d5\u05dd \u05d7\u05de\u05d9\u05e9\u05d9"\.. "\u05d9\u05d5\u05dd \u05e9\u05d9\u05e9\u05d9"\.. "\u05e9\u05d1\u05ea"].. ::msgcat::mcset he MONTHS_ABBREV [list \.. "\u05d9\u05e0\u05d5"\.. "\u05e4\u05d1\u05e8"\.. "\u05de\u05e8\u05e5"\.. "\u05d0\u05e4\u05e8"\.. "\u05de\u05d0\u05d9"\.. "\u05d9\u05d5\u05e0"\.. "\u05d9\u05d5\u05dc"\.. "\u05d0\u05d5\u05d2"\..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1777
                                                                                                                                                                                          Entropy (8bit):4.2117128941697715
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:438n4kALqrU1fbokQTbWqrU1fbokQTw38:28OD86D8gM
                                                                                                                                                                                          MD5:4219A929E27308ADC04A9F368F063F38
                                                                                                                                                                                          SHA1:FA728EEBA8751F4CE032ED32AECFDE124D1B68E2
                                                                                                                                                                                          SHA-256:192F4A8E77E1627712F85533C9896EF6A040157C7BD56DF3A4A7FA56AD6746C2
                                                                                                                                                                                          SHA-512:223B137AC1FC15908F5541067736EF3A29493549B963393EB78660036A82982E57CFC4AD09CBD33D32A5187FF9F4ACFB5F83A0C974702434B7FAD1B2539B7F76
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset hi DAYS_OF_WEEK_FULL [list \.. "\u0930\u0935\u093f\u0935\u093e\u0930"\.. "\u0938\u094b\u092e\u0935\u093e\u0930"\.. "\u092e\u0902\u0917\u0932\u0935\u093e\u0930"\.. "\u092c\u0941\u0927\u0935\u093e\u0930"\.. "\u0917\u0941\u0930\u0941\u0935\u093e\u0930"\.. "\u0936\u0941\u0915\u094d\u0930\u0935\u093e\u0930"\.. "\u0936\u0928\u093f\u0935\u093e\u0930"].. ::msgcat::mcset hi MONTHS_ABBREV [list \.. "\u091c\u0928\u0935\u0930\u0940"\.. "\u092b\u093c\u0930\u0935\u0930\u0940"\.. "\u092e\u093e\u0930\u094d\u091a"\.. "\u0905\u092a\u094d\u0930\u0947\u0932"\.. "\u092e\u0908"\.. "\u091c\u0942\u0928"\.. "\u091c\u0941\u0932\u093e\u0908"\.. "\u0905\u0917\u0938\u094d\u0924"\.. "\u0938\u093f\u0924\u092e\u094d\u092c\u0930"\.. "\u0905\u0915\u094d\u091f\u0942\u092c\u0930"\.. "\u0928\u0935\u
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.9286948144352865
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xocv+IZoz3v6ry/5oco+3v+6f6HyFvn:4EnLB383Jvlg3v6ry/JF3vmSVn
                                                                                                                                                                                          MD5:1C1E1484EA0286175FADCB90937C9F34
                                                                                                                                                                                          SHA1:5CA1BF19021D529CB3B3A308EFFFCA7E4D073640
                                                                                                                                                                                          SHA-256:5A3BF0DD61BFB5A2BF75E96B11E0E3528FFAB720A0BF1923853606F8CAF0E76D
                                                                                                                                                                                          SHA-512:F9A43E1E18ADB6DC6B18BEDC3303A99F514DF6CA54F12100989F734233012D7D60216116915351CCACC12F6942795BF8F3BBD26B15A86E88101067D64BEE54F5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset hi_IN DATE_FORMAT "%d %M %Y".. ::msgcat::mcset hi_IN TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset hi_IN DATE_TIME_FORMAT "%d %M %Y %I:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1171
                                                                                                                                                                                          Entropy (8bit):4.36311224714184
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83dVX79VIE9bLTWnh7rT+5dPcdvgrNv5KvOA1:43kmrQ7n+odIrJ6OS
                                                                                                                                                                                          MD5:906963A3AD09EAC781B35C190B77484E
                                                                                                                                                                                          SHA1:E5AA49DA9C4987EAFA839115F84612426EB8615E
                                                                                                                                                                                          SHA-256:105A9180BC5D23738183374FA0EA8DD80484BF3947E1432E515BDC2913C017D9
                                                                                                                                                                                          SHA-512:557BD1C8306750D09215D9774069A52C7D60E03DE2DF39FF909A8F658AB0565739D127E24ACDC96F736C69A71BEFA30B8A30BB489C7B7FDEA85386C802166349
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset hr DAYS_OF_WEEK_ABBREV [list \.. "ned"\.. "pon"\.. "uto"\.. "sri"\.. "\u010det"\.. "pet"\.. "sub"].. ::msgcat::mcset hr DAYS_OF_WEEK_FULL [list \.. "nedjelja"\.. "ponedjeljak"\.. "utorak"\.. "srijeda"\.. "\u010detvrtak"\.. "petak"\.. "subota"].. ::msgcat::mcset hr MONTHS_ABBREV [list \.. "sij"\.. "vel"\.. "o\u017eu"\.. "tra"\.. "svi"\.. "lip"\.. "srp"\.. "kol"\.. "ruj"\.. "lis"\.. "stu"\.. "pro"\.. ""].. ::msgcat::mcset hr MONTHS_FULL [list \.. "sije\u010danj"\.. "velja\u010da"\.. "o\u017eujak"\.. "travanj"\.. "svibanj"\.. "lipanj"\.. "srpanj"\.. "kolovoz"\.. "rujan"\.. "listopad"\.. "studeni"\.. "prosinac"\..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1381
                                                                                                                                                                                          Entropy (8bit):4.511450677731002
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83IFb7ZTmKrkAYm2LZyyApLDV2uZi5WF+shHUTyvtsv+:43C3ZTmKQAyZyyAp0BotK+
                                                                                                                                                                                          MD5:E398158EE1CD49CB5286D9642D4A61DD
                                                                                                                                                                                          SHA1:A93A588B0ADD198C067C4BB070DC1E5170E6E208
                                                                                                                                                                                          SHA-256:993475532F89E1EA7214ADB265294040862305612D680CFF01DD20615B731CCC
                                                                                                                                                                                          SHA-512:9E5791FB97110FE5F7A1F49FF2ED8801A05E49D5B9AF579474C0081073D2B40ECFFE6E4EB5B61F12B1995FDCC0A557CB572E5E116F951FD286A6254253DAEC01
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset hu DAYS_OF_WEEK_ABBREV [list \.. "V"\.. "H"\.. "K"\.. "Sze"\.. "Cs"\.. "P"\.. "Szo"].. ::msgcat::mcset hu DAYS_OF_WEEK_FULL [list \.. "vas\u00e1rnap"\.. "h\u00e9tf\u0151"\.. "kedd"\.. "szerda"\.. "cs\u00fct\u00f6rt\u00f6k"\.. "p\u00e9ntek"\.. "szombat"].. ::msgcat::mcset hu MONTHS_ABBREV [list \.. "jan."\.. "febr."\.. "m\u00e1rc."\.. "\u00e1pr."\.. "m\u00e1j."\.. "j\u00fan."\.. "j\u00fal."\.. "aug."\.. "szept."\.. "okt."\.. "nov."\.. "dec."\.. ""].. ::msgcat::mcset hu MONTHS_FULL [list \.. "janu\u00e1r"\.. "febru\u00e1r"\.. "m\u00e1rcius"\.. "\u00e1prilis"\.. "m\u00e1jus"\.. "j\u00fanius"\.. "j\u00falius"\.. "augusztus"\.. "szeptembe
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):961
                                                                                                                                                                                          Entropy (8bit):4.02166638427728
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83dcTcWKutdXaMmEfc2ftdT2dHblWZ0VT:43dQrKutdntdI8g
                                                                                                                                                                                          MD5:191ACF2E8A8F10A1360B283D42886382
                                                                                                                                                                                          SHA1:EE2C00D021381EA638B6CE3F395DEA5F8491ED9B
                                                                                                                                                                                          SHA-256:41C0C3D3B4491E9B36E719466503EFCD325175CB7824C4A5055CB113D347BE0F
                                                                                                                                                                                          SHA-512:29BC4F7D3FAE7DE392B175FEA76138FA823B7D9D0B051A19A73F7D36D51DE34E0D0C7C129867307ABF51FC92E70853C15BD96B8484AD21EAB0A8EB83B0411E03
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset id DAYS_OF_WEEK_ABBREV [list \.. "Min"\.. "Sen"\.. "Sel"\.. "Rab"\.. "Kam"\.. "Jum"\.. "Sab"].. ::msgcat::mcset id DAYS_OF_WEEK_FULL [list \.. "Minggu"\.. "Senin"\.. "Selasa"\.. "Rabu"\.. "Kamis"\.. "Jumat"\.. "Sabtu"].. ::msgcat::mcset id MONTHS_ABBREV [list \.. "Jan"\.. "Peb"\.. "Mar"\.. "Apr"\.. "Mei"\.. "Jun"\.. "Jul"\.. "Agu"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Des"\.. ""].. ::msgcat::mcset id MONTHS_FULL [list \.. "Januari"\.. "Pebruari"\.. "Maret"\.. "April"\.. "Mei"\.. "Juni"\.. "Juli"\.. "Agustus"\.. "September"\.. "Oktober"\.. "November"\.. "Desember"\.. ""]..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.904408530699153
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xo0kGMo0F/W3v6ay/5o0kT+3vR6HyFvn:4EnLB383wG33v6ay/wK3voSVn
                                                                                                                                                                                          MD5:FEB4D50576BF3E11A0A40FD29ABE35A7
                                                                                                                                                                                          SHA1:8CEAA187C8AA5EC101743060A877D039850964CA
                                                                                                                                                                                          SHA-256:BA7FC0C0452D3E482DB6E19BDF512CACED639BA72B92ED8F66D80B52FEA11AC0
                                                                                                                                                                                          SHA-512:8B5D18E3D6628F369FB387C8EF08CC80000E0CBE500972958F4AD75F1C2F0DD6058F9777BD7DD0D7C26E7ECAA65E5071E2BF51B560973E88637942116C7576FB
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset id_ID DATE_FORMAT "%d %B %Y".. ::msgcat::mcset id_ID TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset id_ID DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1305
                                                                                                                                                                                          Entropy (8bit):4.457417703528286
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83XVhVTeMVHGPbfXSmWzaZlfFxUQbW1U6ZY95n123etvmv3eTn:43Xz0b/uzaZtXUMw8n
                                                                                                                                                                                          MD5:ACF0452D5BB6D36A40061D2B0AF4D7A6
                                                                                                                                                                                          SHA1:9DF4D88F1962A672EFBDDE524550F7A5D02D446D
                                                                                                                                                                                          SHA-256:778BE3D6BFE2DFFB64FF1AFB9EC8351A3343B314CF93A68E8F7FD1073EE122BB
                                                                                                                                                                                          SHA-512:34CC02D7D28B5E161ED10250C214375561FD3D00979BFB8BCF3DB72A81BD9B7C225301528B400F7C54D8B6379F772EB6477D5D03F2CF7DC4DD19D22AEEC151B5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset is DAYS_OF_WEEK_ABBREV [list \.. "sun."\.. "m\u00e1n."\.. "\u00feri."\.. "mi\u00f0."\.. "fim."\.. "f\u00f6s."\.. "lau."].. ::msgcat::mcset is DAYS_OF_WEEK_FULL [list \.. "sunnudagur"\.. "m\u00e1nudagur"\.. "\u00feri\u00f0judagur"\.. "mi\u00f0vikudagur"\.. "fimmtudagur"\.. "f\u00f6studagur"\.. "laugardagur"].. ::msgcat::mcset is MONTHS_ABBREV [list \.. "jan."\.. "feb."\.. "mar."\.. "apr."\.. "ma\u00ed"\.. "j\u00fan."\.. "j\u00fal."\.. "\u00e1g\u00fa."\.. "sep."\.. "okt."\.. "n\u00f3v."\.. "des."\.. ""].. ::msgcat::mcset is MONTHS_FULL [list \.. "jan\u00faar"\.. "febr\u00faar"\.. "mars"\.. "apr\u00edl"\.. "ma\u00ed"\.. "j\u00fan\u00ed"\.. "j\u00fal\
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1294
                                                                                                                                                                                          Entropy (8bit):4.282101355195382
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83JYEVI2vfYpQjAOnhWBIIsmdC2lkOKk+Z+FoPJ6G3vesvY:43JZVB8eAOnh4IzR2+J6G/eKY
                                                                                                                                                                                          MD5:3354A6FC06C298E33AA14163929E56EB
                                                                                                                                                                                          SHA1:C3005370DAE8A266AE21F7E2B871AEA5A656A155
                                                                                                                                                                                          SHA-256:1D72170B9F9028A237364F7CD7EA8B48BD4770E61922205CE862300103B13DE5
                                                                                                                                                                                          SHA-512:58B64D4F5827CA2A1BF2DDFD1F7EFDDBBD46709A6A9B7277E8EB386D80043A87ADDE2B3D5A49A934E8EB8F797BD735FADA1D22AD3DD856FFE9507F71B9E45CBA
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset it DAYS_OF_WEEK_ABBREV [list \.. "dom"\.. "lun"\.. "mar"\.. "mer"\.. "gio"\.. "ven"\.. "sab"].. ::msgcat::mcset it DAYS_OF_WEEK_FULL [list \.. "domenica"\.. "luned\u00ec"\.. "marted\u00ec"\.. "mercoled\u00ec"\.. "gioved\u00ec"\.. "venerd\u00ec"\.. "sabato"].. ::msgcat::mcset it MONTHS_ABBREV [list \.. "gen"\.. "feb"\.. "mar"\.. "apr"\.. "mag"\.. "giu"\.. "lug"\.. "ago"\.. "set"\.. "ott"\.. "nov"\.. "dic"\.. ""].. ::msgcat::mcset it MONTHS_FULL [list \.. "gennaio"\.. "febbraio"\.. "marzo"\.. "aprile"\.. "maggio"\.. "giugno"\.. "luglio"\.. "agosto"\.. "settembre"\.. "ottobre"\.. "novembre"\.. "dicembre"\.. "
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):250
                                                                                                                                                                                          Entropy (8bit):4.8982877714191035
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoi5jL/oyJ+3v1oia+3vjLtAsvn:4EnLB383b3F+3vV3v3tnn
                                                                                                                                                                                          MD5:E4400C16406A46C2880250522BED2EDE
                                                                                                                                                                                          SHA1:787A04037A355FF845025B8865335EB938280BFB
                                                                                                                                                                                          SHA-256:24B5F303F5C7AF6F63FDC23ADB4D713087AE74B6D18C117D787AF03374C5F57E
                                                                                                                                                                                          SHA-512:3551DEEF0EAAC66042143F77F2F4DD9154764F35BD624DAB3C9F0F59F3489CA39CE34BC2A69BC5BFBB1926C6F5C39D74A806ECB1A47F6B374101071957FD417B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset it_CH DATE_FORMAT "%e. %B %Y".. ::msgcat::mcset it_CH TIME_FORMAT "%H:%M:%S".. ::msgcat::mcset it_CH DATE_TIME_FORMAT "%e. %B %Y %H:%M:%S %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1689
                                                                                                                                                                                          Entropy (8bit):4.951012555106795
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83Gl84OCtnbf3wvtMwvLv4GTwhvevTwSoXghGhD6h:43FULWttbdEVoES8gshD6h
                                                                                                                                                                                          MD5:11FBE427747012444AEEAFD6134034A4
                                                                                                                                                                                          SHA1:58C72C432053264EAE6335D6CC93C5FFA33C42B8
                                                                                                                                                                                          SHA-256:2B6D15A191437F1B84FA7023E34153B61E6BF1DE1452EA921E9CCBBE5D4BEB1C
                                                                                                                                                                                          SHA-512:4F993BDF5D50D6D9F7410C83D226FEF30BA8C989F9977A7025C36BE22CEECCD6C68CDD6AFC5C9CE3D700559C4EDC619042E14DD88EE7583B9D5AA66F0268FD23
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ja DAYS_OF_WEEK_ABBREV [list \.. "\u65e5"\.. "\u6708"\.. "\u706b"\.. "\u6c34"\.. "\u6728"\.. "\u91d1"\.. "\u571f"].. ::msgcat::mcset ja DAYS_OF_WEEK_FULL [list \.. "\u65e5\u66dc\u65e5"\.. "\u6708\u66dc\u65e5"\.. "\u706b\u66dc\u65e5"\.. "\u6c34\u66dc\u65e5"\.. "\u6728\u66dc\u65e5"\.. "\u91d1\u66dc\u65e5"\.. "\u571f\u66dc\u65e5"].. ::msgcat::mcset ja MONTHS_FULL [list \.. "1\u6708"\.. "2\u6708"\.. "3\u6708"\.. "4\u6708"\.. "5\u6708"\.. "6\u6708"\.. "7\u6708"\.. "8\u6708"\.. "9\u6708"\.. "10\u6708"\.. "11\u6708"\.. "12\u6708"].. ::msgcat::mcset ja BCE "\u7d00\u5143\u524d".. ::msgcat::mcset ja CE "\u897f\u66a6".. ::msgcat::mcset ja AM "\u5348\u524d".. ::msgcat::mcset ja PM "\u5348\u5f8c".. ::ms
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1025
                                                                                                                                                                                          Entropy (8bit):4.097746630492712
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83E7XIE/OWbjH3Tw2PzJrIsmZ5maAXaMHPB:43WlrraA/vB
                                                                                                                                                                                          MD5:2F79804667D6F8C77BB188D59EF5F3DF
                                                                                                                                                                                          SHA1:10950ECA798F24A7C405B3E18B559CCC0C056EC1
                                                                                                                                                                                          SHA-256:96FF17F1CFF976E4E204D3616D1EFCED4D0F907C5E6A0F04B4536CB4AD1190C9
                                                                                                                                                                                          SHA-512:1B8ADC3B7FF920F8F53A17BFCC7EA24A0F8E276A42E5C63F9880DAE9B74E12716DD12DB647A80A9D99294449146C643EC58A33B03681AA4FA26A5FBC508C248C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset kl DAYS_OF_WEEK_ABBREV [list \.. "sab"\.. "ata"\.. "mar"\.. "pin"\.. "sis"\.. "tal"\.. "arf"].. ::msgcat::mcset kl DAYS_OF_WEEK_FULL [list \.. "sabaat"\.. "ataasinngorneq"\.. "marlunngorneq"\.. "pingasunngorneq"\.. "sisamanngorneq"\.. "tallimanngorneq"\.. "arfininngorneq"].. ::msgcat::mcset kl MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "maj"\.. "jun"\.. "jul"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "dec"\.. ""].. ::msgcat::mcset kl MONTHS_FULL [list \.. "januari"\.. "februari"\.. "martsi"\.. "aprili"\.. "maji"\.. "juni"\.. "juli"\.. "augustusi"\.. "septemberi"\.. "oktoberi"\.. "novemberi"\.. "dece
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):286
                                                                                                                                                                                          Entropy (8bit):4.882476709336307
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoEpb53FuoEpLE3vLjoEpLE3v6mjoEpba+3vnFDoAkvn:4EnLB383jF3Fyw3vxw3v6A/3v9dmn
                                                                                                                                                                                          MD5:255830678C8724E65C05A7E020E68B5B
                                                                                                                                                                                          SHA1:0AEA48AB0439C04F92B5CA9A3B5182718B7F116B
                                                                                                                                                                                          SHA-256:3027CFE9EBD2172CEFC15C025786CAD47A6E2894BF0474AFC1B0C341E70202AA
                                                                                                                                                                                          SHA-512:99039FFA7269DD136D1693121E261DB5586E86EC401D2B1EB8FB1D13A9A7F1E514D9FC941B838286B986C02ED281828ED67E59002D837E350A64F4832340516A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset kl_GL DATE_FORMAT "%d %b %Y".. ::msgcat::mcset kl_GL TIME_FORMAT "%T".. ::msgcat::mcset kl_GL TIME_FORMAT_12 "%T".. ::msgcat::mcset kl_GL DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1621
                                                                                                                                                                                          Entropy (8bit):4.612163420716489
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:43fMlylslXlslxl1hVuqLGuqqntH4xUyw9:2fKYqVq3f
                                                                                                                                                                                          MD5:CCB2C2254D3FA3025183DB7E010CAD66
                                                                                                                                                                                          SHA1:510BBB6A9162F2EF908E6561CC714848C2EA74CA
                                                                                                                                                                                          SHA-256:EF6FB319C398EEA79B3A951319F831F3B186D556565D17D738E5F9B4B77570F2
                                                                                                                                                                                          SHA-512:A0264565899BD1B0783ADC0388F893CCE713ADB23BDD63907CF092A74ACB4F7D3BE09DA29801E9C11A7B08CB1706E3771C598ACED351A0FCCBF4EBBD7871148D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ko DAYS_OF_WEEK_ABBREV [list \.. "\uc77c"\.. "\uc6d4"\.. "\ud654"\.. "\uc218"\.. "\ubaa9"\.. "\uae08"\.. "\ud1a0"].. ::msgcat::mcset ko DAYS_OF_WEEK_FULL [list \.. "\uc77c\uc694\uc77c"\.. "\uc6d4\uc694\uc77c"\.. "\ud654\uc694\uc77c"\.. "\uc218\uc694\uc77c"\.. "\ubaa9\uc694\uc77c"\.. "\uae08\uc694\uc77c"\.. "\ud1a0\uc694\uc77c"].. ::msgcat::mcset ko MONTHS_ABBREV [list \.. "1\uc6d4"\.. "2\uc6d4"\.. "3\uc6d4"\.. "4\uc6d4"\.. "5\uc6d4"\.. "6\uc6d4"\.. "7\uc6d4"\.. "8\uc6d4"\.. "9\uc6d4"\.. "10\uc6d4"\.. "11\uc6d4"\.. "12\uc6d4"\.. ""].. ::msgcat::mcset ko MONTHS_FULL [list \.. "1\uc6d4"\.. "2\uc6d4"\.. "3\uc6d4"\.. "4\uc6d4"\.. "5\uc6d4"\.. "6\uc6d4"\..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):354
                                                                                                                                                                                          Entropy (8bit):5.058233326545794
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xo56SFZhjAo56m5Ys5o56TGMovBo56a/W3v6mfKo56TT+3+:4EnLB383g62vjV6m5Ysg6TG26a+3v6oo
                                                                                                                                                                                          MD5:58CA45CE26AF8ECA729BA72898BB633D
                                                                                                                                                                                          SHA1:CBBEDB7370890A1DB65080A359A9A5C164B525D5
                                                                                                                                                                                          SHA-256:4CAC8FB43D290A63A4D3215F22228B358AB4FA174F08712DD6C5B64C5E485071
                                                                                                                                                                                          SHA-512:48CCBD3F7B96D0998B6D1A1F8D7FE2B4B070BB5B8809FABE0A38209AEAF2E95E098292A5B9B5F0954E7729708A2173D32AAD70B6C0F336DB1E9BFA2968E6A56B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ko_KR BCE "\uae30\uc6d0\uc804".. ::msgcat::mcset ko_KR CE "\uc11c\uae30".. ::msgcat::mcset ko_KR DATE_FORMAT "%Y.%m.%d".. ::msgcat::mcset ko_KR TIME_FORMAT_12 "%P %l:%M:%S".. ::msgcat::mcset ko_KR DATE_TIME_FORMAT "%Y.%m.%d %P %l:%M:%S %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1997
                                                                                                                                                                                          Entropy (8bit):4.202940482570495
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83cm48Vc7VczMmDNVcYVcR0prdSmS68FeDJVcYVcR0prdSmS68FeuT:4354a+0prjS68mq0prjS68pT
                                                                                                                                                                                          MD5:67FA08F588A3B44D67E42EC1025013BC
                                                                                                                                                                                          SHA1:6895FEF0476DE0349895DB052B335AC46636B23A
                                                                                                                                                                                          SHA-256:9D215E31A39FED45B3657144E5F73C942E59E500036CE16B1FFF201FD6358595
                                                                                                                                                                                          SHA-512:4C2708BD9DD98320D3133EEFFD19A8018F49A36AB8348DB7C0B0287ADB4C052D3EFAD3686C8E46E0520F3CE27F361978272BA8752EB04E5A7BC07780398480DB
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset kok DAYS_OF_WEEK_FULL [list \.. "\u0906\u0926\u093f\u0924\u094d\u092f\u0935\u093e\u0930"\.. "\u0938\u094b\u092e\u0935\u093e\u0930"\.. "\u092e\u0902\u0917\u0933\u093e\u0930"\.. "\u092c\u0941\u0927\u0935\u093e\u0930"\.. "\u0917\u0941\u0930\u0941\u0935\u093e\u0930"\.. "\u0936\u0941\u0915\u094d\u0930\u0935\u093e\u0930"\.. "\u0936\u0928\u093f\u0935\u093e\u0930"].. ::msgcat::mcset kok MONTHS_ABBREV [list \.. "\u091c\u093e\u0928\u0947\u0935\u093e\u0930\u0940"\.. "\u092b\u0947\u092c\u0943\u0935\u093e\u0930\u0940"\.. "\u092e\u093e\u0930\u094d\u091a"\.. "\u090f\u092a\u094d\u0930\u093f\u0932"\.. "\u092e\u0947"\.. "\u091c\u0942\u0928"\.. "\u091c\u0941\u0932\u0948"\.. "\u0913\u0917\u0938\u094d\u091f"\.. "\u0938\u0947\u092a\u094d\u091f\u0947\u0902\u092c\u0930"\.. "\u0913\u0915\u094d\
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):260
                                                                                                                                                                                          Entropy (8bit):4.904340548436718
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xo5VsNv+IZo5VsU3v6ry/5o5VsNo+3v+6f6HyFvn:4EnLB383gVsNvlAVsU3v6ry/gVsNF3vj
                                                                                                                                                                                          MD5:0AA20289A63BA3A14DCFED75EED980DE
                                                                                                                                                                                          SHA1:2B76013593D886B0724D82849FD1840B20922902
                                                                                                                                                                                          SHA-256:644F2B6D4BA27AF14891B781DEF60F708A9F18FC2F73566649B631A6DEA3EF09
                                                                                                                                                                                          SHA-512:6E13E0DC8BFD2ABE0D04B0BC098C40972F088F8D3D6ACA00338B17473ABC6F69840A88EC0C965C493B4270DEC777A0EA2D762BC33044EFE7030E437604EE201B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset kok_IN DATE_FORMAT "%d %M %Y".. ::msgcat::mcset kok_IN TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset kok_IN DATE_TIME_FORMAT "%d %M %Y %I:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1013
                                                                                                                                                                                          Entropy (8bit):4.060027087416375
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83no1UwRlw4MAwBdc//3rpF6HFoot8:43vglHM7MTCHFs
                                                                                                                                                                                          MD5:CCEC7B77DCA1F6A406311FC43EE57030
                                                                                                                                                                                          SHA1:4ED329BB09A8F7C67F8984CD790E9B6819DE6F00
                                                                                                                                                                                          SHA-256:EAB468AC5BF1833D4F8CD658789413D4A46CAD16B63FB9B906CFF6DC9EA26251
                                                                                                                                                                                          SHA-512:4EFF6E49CC479A1BF0CEEAE256A1FAE7D4AE7D0ACE23CD87851471EC96BB5AF580C58A142E1B6CE72BC8B6BFF946A38801E681443B7DD9527A1DEB6E7EDD7D22
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset kw DAYS_OF_WEEK_ABBREV [list \.. "Sul"\.. "Lun"\.. "Mth"\.. "Mhr"\.. "Yow"\.. "Gwe"\.. "Sad"].. ::msgcat::mcset kw DAYS_OF_WEEK_FULL [list \.. "De Sul"\.. "De Lun"\.. "De Merth"\.. "De Merher"\.. "De Yow"\.. "De Gwener"\.. "De Sadorn"].. ::msgcat::mcset kw MONTHS_ABBREV [list \.. "Gen"\.. "Whe"\.. "Mer"\.. "Ebr"\.. "Me"\.. "Evn"\.. "Gor"\.. "Est"\.. "Gwn"\.. "Hed"\.. "Du"\.. "Kev"\.. ""].. ::msgcat::mcset kw MONTHS_FULL [list \.. "Mys Genver"\.. "Mys Whevrel"\.. "Mys Merth"\.. "Mys Ebrel"\.. "Mys Me"\.. "Mys Evan"\.. "Mys Gortheren"\.. "Mye Est"\.. "Mys Gwyngala"\.. "Mys Hedra"\.. "Mys Du"\.. "Mys Kevardhu"\..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.959913054070712
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoh6AvMoh633v6ay/5oh6Ao+3vR6HyFvn:4EnLB38346AvR633v6ay/46AF3voSVn
                                                                                                                                                                                          MD5:18E8576F63B978F1AFEF15AC57B44FBF
                                                                                                                                                                                          SHA1:D50EB90944FF81E3CBFF942B16C1874EB7EA2562
                                                                                                                                                                                          SHA-256:EDAC14D929D1C6559EC46E9B460F8F44A189B78FB915F2D641104549CBD94188
                                                                                                                                                                                          SHA-512:F3DE5EE77BB889DA1353F9C9A1811083AB28BBEE4B7D6C8782F38B1AE44CF77565371A0E18F7E2BACD7EF590BC1215CA3E41AF929A15F60B3E85F6099A4CF378
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset kw_GB DATE_FORMAT "%d %B %Y".. ::msgcat::mcset kw_GB TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset kw_GB DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1307
                                                                                                                                                                                          Entropy (8bit):4.506235846178408
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83iHYuAMLzHYCaNu3d3nT15T31FhAlDgK/YrDZ/6Qz2C9kGPCveksvc:43iHFnHuUd3/T3xM/+SQCC9kGPEekKc
                                                                                                                                                                                          MD5:D4EC2E96995E0EB263F338DD16CC4F8D
                                                                                                                                                                                          SHA1:7ED86175489B1AE3CA5C0E8D42969F951C895D6B
                                                                                                                                                                                          SHA-256:855B652FCC8066BA45C7DC8DBFD3807D1B4759EA8D71C523567F47BF445D1DE6
                                                                                                                                                                                          SHA-512:A55E0D759A22360FF6668CEFAFFB812BABB316C447ADDB1FD5CDBC06AE1DA2E891E09952D073164C013AD9BF4184614102E7ADA553EEEFB2BBA26208B79B277F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset lt DAYS_OF_WEEK_ABBREV [list \.. "Sk"\.. "Pr"\.. "An"\.. "Tr"\.. "Kt"\.. "Pn"\.. "\u0160t"].. ::msgcat::mcset lt DAYS_OF_WEEK_FULL [list \.. "Sekmadienis"\.. "Pirmadienis"\.. "Antradienis"\.. "Tre\u010diadienis"\.. "Ketvirtadienis"\.. "Penktadienis"\.. "\u0160e\u0161tadienis"].. ::msgcat::mcset lt MONTHS_ABBREV [list \.. "Sau"\.. "Vas"\.. "Kov"\.. "Bal"\.. "Geg"\.. "Bir"\.. "Lie"\.. "Rgp"\.. "Rgs"\.. "Spa"\.. "Lap"\.. "Grd"\.. ""].. ::msgcat::mcset lt MONTHS_FULL [list \.. "Sausio"\.. "Vasario"\.. "Kovo"\.. "Baland\u017eio"\.. "Gegu\u017e\u0117s"\.. "Bir\u017eelio"\.. "Liepos"\.. "Rugpj\u016b\u010dio"\.. "Rugs\u0117jo"\.. "Spa
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1271
                                                                                                                                                                                          Entropy (8bit):4.460631492946299
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83Amshb4mZdA7nl9kMmfpK269rkbi5vWm0W9ARivirXsv05vkn:430bHA7XRr95QWQQgaKkn
                                                                                                                                                                                          MD5:554ED2CAFD25F5F82DA54AE057F4BA98
                                                                                                                                                                                          SHA1:E25CDF0F9C4B523B5B05408E7820F7B4F627D19E
                                                                                                                                                                                          SHA-256:7E90D2008B220DB19C796C7107AD69D263B8AC8C7BDDFB879230699D978E9A0A
                                                                                                                                                                                          SHA-512:612201CCD64A51EC943921196D8C74D8BCA3AB3E35B0C9E91AE7F3A6B36F4F255AA9ADB3A254EC03629B01BD221B0B3F8CC4DFBFAC1F1718775E81CAD188AA86
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset lv DAYS_OF_WEEK_ABBREV [list \.. "Sv"\.. "P"\.. "O"\.. "T"\.. "C"\.. "Pk"\.. "S"].. ::msgcat::mcset lv DAYS_OF_WEEK_FULL [list \.. "sv\u0113tdiena"\.. "pirmdiena"\.. "otrdiena"\.. "tre\u0161diena"\.. "ceturdien"\.. "piektdiena"\.. "sestdiena"].. ::msgcat::mcset lv MONTHS_ABBREV [list \.. "Jan"\.. "Feb"\.. "Mar"\.. "Apr"\.. "Maijs"\.. "J\u016bn"\.. "J\u016bl"\.. "Aug"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Dec"\.. ""].. ::msgcat::mcset lv MONTHS_FULL [list \.. "janv\u0101ris"\.. "febru\u0101ris"\.. "marts"\.. "apr\u012blis"\.. "maijs"\.. "j\u016bnijs"\.. "j\u016blijs"\.. "augusts"\.. "septembris"\.. "oktobris"\.. "novembris"\..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2157
                                                                                                                                                                                          Entropy (8bit):4.299300188052441
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:4389QMsGqdQfRQPjQmofqJp9sk5BstSpWQiQ3QJQ5QL39I0QRQTQ8Ql4J8W:2W8SMq+9sWINi2Kc9I0+gXF
                                                                                                                                                                                          MD5:888014F13A82511ABEF99497A753BFC3
                                                                                                                                                                                          SHA1:7F4231BEDE191370B37E8B917B6AD8829D15CA7D
                                                                                                                                                                                          SHA-256:4C0EB07F0FCB36DD12A3F7EDD6531616611ABF62BF7705B5A37CC59098221D5D
                                                                                                                                                                                          SHA-512:D748127CC615584901D35B6492EC566448B6C4DA6363858B5145921E9CD09490355CF4315F0F7A8542AA12790CD3432011A643A3A8F74B0119DB0DCE19FD68A4
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset mk DAYS_OF_WEEK_ABBREV [list \.. "\u043d\u0435\u0434."\.. "\u043f\u043e\u043d."\.. "\u0432\u0442."\.. "\u0441\u0440\u0435."\.. "\u0447\u0435\u0442."\.. "\u043f\u0435\u0442."\.. "\u0441\u0430\u0431."].. ::msgcat::mcset mk DAYS_OF_WEEK_FULL [list \.. "\u043d\u0435\u0434\u0435\u043b\u0430"\.. "\u043f\u043e\u043d\u0435\u0434\u0435\u043b\u043d\u0438\u043a"\.. "\u0432\u0442\u043e\u0440\u043d\u0438\u043a"\.. "\u0441\u0440\u0435\u0434\u0430"\.. "\u0447\u0435\u0442\u0432\u0440\u0442\u043e\u043a"\.. "\u043f\u0435\u0442\u043e\u043a"\.. "\u0441\u0430\u0431\u043e\u0442\u0430"].. ::msgcat::mcset mk MONTHS_ABBREV [list \.. "\u0458\u0430\u043d."\.. "\u0444\u0435\u0432."\.. "\u043c\u0430\u0440."\.. "\u0430\u043f\u0440."\.. "\u043c\u0430\u0458."\.. "\u0458\u0443\u
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1846
                                                                                                                                                                                          Entropy (8bit):4.220147808639664
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR833cXh48Vc7VczfVczPmzNVcYVcR0prdSmS68FezUVcYVcR0prdSmS68FeoV:43K4S+0prjS68Yh0prjS68nV
                                                                                                                                                                                          MD5:07F99E0A05083B10F80A4D6867163B23
                                                                                                                                                                                          SHA1:B6036C7DA8043E3401583D03831E7A4BF755D93D
                                                                                                                                                                                          SHA-256:AE873BF5484EACBBE179913D43451BE53378FA701B5D81594D052266B8A09AF0
                                                                                                                                                                                          SHA-512:3A032C81B8FBFEE6EB66C1538CBD16329A1B393E4684B4E9B3FBCDD6344CE8AD34FA699F76EF953B3EB597D8E253345F54C2E92E7A43611C721038BCC2471EA2
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset mr DAYS_OF_WEEK_FULL [list \.. "\u0930\u0935\u093f\u0935\u093e\u0930"\.. "\u0938\u094b\u092e\u0935\u093e\u0930"\.. "\u092e\u0902\u0917\u0933\u0935\u093e\u0930"\.. "\u092e\u0902\u0917\u0933\u0935\u093e\u0930"\.. "\u0917\u0941\u0930\u0941\u0935\u093e\u0930"\.. "\u0936\u0941\u0915\u094d\u0930\u0935\u093e\u0930"\.. "\u0936\u0928\u093f\u0935\u093e\u0930"].. ::msgcat::mcset mr MONTHS_ABBREV [list \.. "\u091c\u093e\u0928\u0947\u0935\u093e\u0930\u0940"\.. "\u092b\u0947\u092c\u0943\u0935\u093e\u0930\u0940"\.. "\u092e\u093e\u0930\u094d\u091a"\.. "\u090f\u092a\u094d\u0930\u093f\u0932"\.. "\u092e\u0947"\.. "\u091c\u0942\u0928"\.. "\u091c\u0941\u0932\u0948"\.. "\u0913\u0917\u0938\u094d\u091f"\.. "\u0938\u0947\u092a\u094d\u091f\u0947\u0902\u092c\u0930"\.. "\u0913\u0915\u094d\u091f\u0
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.89440333975705
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoGNv+IZoGU3v6ry/5oGNo+3v+6f6HyFvn:4EnLB383Zvlw3v6ry/ZF3vmSVn
                                                                                                                                                                                          MD5:67368E8A5715860BABD44E54A168192F
                                                                                                                                                                                          SHA1:7790D4B4B28FE5E38AB11CD037FFB826A8EB77FD
                                                                                                                                                                                          SHA-256:B7B1D379355A1D278E13EF557A887A662E84FB6A9B62B8E19A27927926270EF9
                                                                                                                                                                                          SHA-512:E95C90CFFA7CC4E61026FC328A4AA0BEE6A54A0061BA0B9459F9F0F4B008DD36F81BC9B8D8B964FA051FCEAB7FECE6D107CD456B3FD01A83B4900ECC3A0BCFA4
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset mr_IN DATE_FORMAT "%d %M %Y".. ::msgcat::mcset mr_IN TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset mr_IN DATE_TIME_FORMAT "%d %M %Y %I:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):957
                                                                                                                                                                                          Entropy (8bit):4.018924167342869
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:4EnLB383Zm/aufodZmt+JHEA7UVRosmAL/7Idzr43xRRosuL1PJHWZ6tHhHjv:4aR83ZsauSHJkA7umE/72UD21PJWZ0hT
                                                                                                                                                                                          MD5:7E6A943B7D82404F61BDBD95682073CD
                                                                                                                                                                                          SHA1:B96DBB1738F293D2842FDCEDF2DEF13004F77A8D
                                                                                                                                                                                          SHA-256:970B2F3ECC04980FCC2F9531CA6CE2BF36BC12942CB614BF70313B4CB0508985
                                                                                                                                                                                          SHA-512:12F5A5F7A170EE79D1F4398E96FF2DE84472027C5B5003DE7E86F46713E3F0997439E2EBA03FFB7DB611F0CE0E06EB149F5BD08ED2AA0409DB8348867487FFFD
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ms DAYS_OF_WEEK_ABBREV [list \.. "Aha"\.. "Isn"\.. "Sei"\.. "Rab"\.. "Kha"\.. "Jum"\.. "Sab"].. ::msgcat::mcset ms DAYS_OF_WEEK_FULL [list \.. "Ahad"\.. "Isnin"\.. "Selasa"\.. "Rahu"\.. "Khamis"\.. "Jumaat"\.. "Sabtu"].. ::msgcat::mcset ms MONTHS_ABBREV [list \.. "Jan"\.. "Feb"\.. "Mac"\.. "Apr"\.. "Mei"\.. "Jun"\.. "Jul"\.. "Ogos"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Dis"\.. ""].. ::msgcat::mcset ms MONTHS_FULL [list \.. "Januari"\.. "Februari"\.. "Mac"\.. "April"\.. "Mei"\.. "Jun"\.. "Julai"\.. "Ogos"\.. "September"\.. "Oktober"\.. "November"\.. "Disember"\.. ""]..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):265
                                                                                                                                                                                          Entropy (8bit):4.818053174805798
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoChFfluoChF+3v6xyFjoCh++3vflm68vn:4EnLB383xPflwe3v6gZl3vflm6+n
                                                                                                                                                                                          MD5:A02F11BE0DF920E63E7A3ACCE746E32D
                                                                                                                                                                                          SHA1:4A8B1EF1A6F8A5FD022042D6E009A01E4B0FEBD3
                                                                                                                                                                                          SHA-256:F5B859D8DD2A2B5F756E39B0DFEB26B95878D2F54BA3CE46C56F0F26CF2B554B
                                                                                                                                                                                          SHA-512:5F9AF8C89F491CB4C158ED73EA4CF32E6A83CF44A94DA6FE1A962C58199BF2348530F3DEFA0C6F433BA3ADEF81AE9B3884F30CD7A841B159D52F9F21008B4F92
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ms_MY DATE_FORMAT "%A %d %b %Y".. ::msgcat::mcset ms_MY TIME_FORMAT_12 "%I:%M:%S %z".. ::msgcat::mcset ms_MY DATE_TIME_FORMAT "%A %d %b %Y %I:%M:%S %z %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):717
                                                                                                                                                                                          Entropy (8bit):4.55153350337982
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:4EnLB383VYmxWHWog4QUbxMmAMMiGZu+3v6ay/GK3vZsSVn:4aR83VYsxonQ2MmVVGRvjCGsvGSV
                                                                                                                                                                                          MD5:D8BBEC2F8935054E6081BB5E4AE8F7E3
                                                                                                                                                                                          SHA1:33FE6D51A284B8760BC6F442329B10374F506BDA
                                                                                                                                                                                          SHA-256:7DBC4E82D82FDE8CDF522FA10E082289D46B0C1A4A7D7A5FA83FF116677F052B
                                                                                                                                                                                          SHA-512:BF39C75DD6B3625897D7D44AC253AF5656CA21D0B394F78611584E2606CBC419C4A02353542D23393BEBCCF0CB4D861CDECD61AD89339F78C0260E966B495777
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset mt DAYS_OF_WEEK_ABBREV [list \.. "\u0126ad"\.. "Tne"\.. "Tli"\.. "Erb"\.. "\u0126am"\.. "\u0120im"].. ::msgcat::mcset mt MONTHS_ABBREV [list \.. "Jan"\.. "Fra"\.. "Mar"\.. "Apr"\.. "Mej"\.. "\u0120un"\.. "Lul"\.. "Awi"\.. "Set"\.. "Ott"\.. "Nov"].. ::msgcat::mcset mt BCE "QK".. ::msgcat::mcset mt CE "".. ::msgcat::mcset mt DATE_FORMAT "%A, %e ta %B, %Y".. ::msgcat::mcset mt TIME_FORMAT_12 "%l:%M:%S %P".. ::msgcat::mcset mt DATE_TIME_FORMAT "%A, %e ta %B, %Y %l:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1209
                                                                                                                                                                                          Entropy (8bit):4.313626715960843
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83B0tSYuZrIsmYmPAxyIQ4HU92W16EL3Tvav31:43qhuZrIPAt04yTcF
                                                                                                                                                                                          MD5:42D02C3CAF28BE4994F27CEF5A183AB7
                                                                                                                                                                                          SHA1:DC411E8AC12C3D588AB2F3A3C95A75D8689AD402
                                                                                                                                                                                          SHA-256:534C5DACEF12F818FAF4ED806997A559F95D591F1B6236B0C30B07A107DD13F3
                                                                                                                                                                                          SHA-512:0BE27572106324FE2B6CDFF4513500DE7582AD1ABEF451FFC62B2050D3875A149DDDB66451E1B3F5BA9216268E9998D2A1C1E8343BBB9EF97947DA054B82818E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset nb DAYS_OF_WEEK_ABBREV [list \.. "s\u00f8"\.. "ma"\.. "ti"\.. "on"\.. "to"\.. "fr"\.. "l\u00f8"].. ::msgcat::mcset nb DAYS_OF_WEEK_FULL [list \.. "s\u00f8ndag"\.. "mandag"\.. "tirsdag"\.. "onsdag"\.. "torsdag"\.. "fredag"\.. "l\u00f8rdag"].. ::msgcat::mcset nb MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "mai"\.. "jun"\.. "jul"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "des"\.. ""].. ::msgcat::mcset nb MONTHS_FULL [list \.. "januar"\.. "februar"\.. "mars"\.. "april"\.. "mai"\.. "juni"\.. "juli"\.. "august"\.. "september"\.. "oktober"\.. "november"\.. "desember"\.. ""].. ::msgcat::mcset nb BC
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1129
                                                                                                                                                                                          Entropy (8bit):4.235969198645435
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR837Ed+RxRMZZsmUmnZAEEHM92WFU5vtrvs:43AAHRMZZPnZALsCtt7s
                                                                                                                                                                                          MD5:B9B949794203D204628D4DBEA29587AE
                                                                                                                                                                                          SHA1:1642D8040144469B5C359E80693E68036F87B849
                                                                                                                                                                                          SHA-256:9E2FE3851CF13EC79A9B10A09B01CEB0A26044AE0DC90A4E00BE57745E854C79
                                                                                                                                                                                          SHA-512:0CCCCF6D61423CEE0389C3BA1A8E94F2B092C53465D1937F5595AF91E46DD38B318D6C7EE3D88B89F32BFB952C0D55E0E67B46D7DF306ECA6690E283ADEB2CB9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset nl DAYS_OF_WEEK_ABBREV [list \.. "zo"\.. "ma"\.. "di"\.. "wo"\.. "do"\.. "vr"\.. "za"].. ::msgcat::mcset nl DAYS_OF_WEEK_FULL [list \.. "zondag"\.. "maandag"\.. "dinsdag"\.. "woensdag"\.. "donderdag"\.. "vrijdag"\.. "zaterdag"].. ::msgcat::mcset nl MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mrt"\.. "apr"\.. "mei"\.. "jun"\.. "jul"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "dec"\.. ""].. ::msgcat::mcset nl MONTHS_FULL [list \.. "januari"\.. "februari"\.. "maart"\.. "april"\.. "mei"\.. "juni"\.. "juli"\.. "augustus"\.. "september"\.. "oktober"\.. "november"\.. "december"\.. ""].. ::msgcat::mcset nl DATE_FORM
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):286
                                                                                                                                                                                          Entropy (8bit):4.865165930946383
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xo4gPPdjog9X3vLjog9X3v6mjo49+3vnFDoAkvn:4EnLB3835gHdPF3vjF3v64I3v9dmn
                                                                                                                                                                                          MD5:3261F397ED0291368FF1881E7BA08ECE
                                                                                                                                                                                          SHA1:7147ABB62034EB152B1FED9246A533535F07372C
                                                                                                                                                                                          SHA-256:77A69DD60D171B321512B14794E75A66FF753410C007997B310790D86E09B057
                                                                                                                                                                                          SHA-512:C1526F454FA594DAD056B056F76F01D8B2AB713D04EB2A3643416B8E741B248CC94E000BAEE5B0F60436B88B1216FB1DE7F7C3FA456D4A4FBDE24F97C3B739B8
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset nl_BE DATE_FORMAT "%d-%m-%y".. ::msgcat::mcset nl_BE TIME_FORMAT "%T".. ::msgcat::mcset nl_BE TIME_FORMAT_12 "%T".. ::msgcat::mcset nl_BE DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1200
                                                                                                                                                                                          Entropy (8bit):4.282788574144479
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83tCtrJwuQrIsmYmLAxyIQ4HU92W1W4/3Hv+v31:434suQrILAt0EafIF
                                                                                                                                                                                          MD5:985E97517C2BF37719A618F575DF392C
                                                                                                                                                                                          SHA1:65BC07FC3A955300ED09B7485F90AEC18CBAD43F
                                                                                                                                                                                          SHA-256:06FA2D6D8C59D0B8EAC2EDE5AB0DDB8B6E095D1A023B1966FCE3B65916FA14FB
                                                                                                                                                                                          SHA-512:75BC14DBAD147A98D32D2AF0BE0BE50F115BB9C3BBE283B53977B9F264A055734B30F6B1C4EEE9686F1874D178C535111731C92D495B7D370FB17213B65C9A40
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset nn DAYS_OF_WEEK_ABBREV [list \.. "su"\.. "m\u00e5"\.. "ty"\.. "on"\.. "to"\.. "fr"\.. "lau"].. ::msgcat::mcset nn DAYS_OF_WEEK_FULL [list \.. "sundag"\.. "m\u00e5ndag"\.. "tysdag"\.. "onsdag"\.. "torsdag"\.. "fredag"\.. "laurdag"].. ::msgcat::mcset nn MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "mai"\.. "jun"\.. "jul"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "des"\.. ""].. ::msgcat::mcset nn MONTHS_FULL [list \.. "januar"\.. "februar"\.. "mars"\.. "april"\.. "mai"\.. "juni"\.. "juli"\.. "august"\.. "september"\.. "oktober"\.. "november"\.. "desember"\.. ""].. ::msgcat::mcset nn BCE "f.Kr."
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1263
                                                                                                                                                                                          Entropy (8bit):4.459506202908786
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83lUj0ORGgIzdW6RDYKG7FwRc0ypvOvX:43+HMg2W6RDYnFwRc0ydYX
                                                                                                                                                                                          MD5:79AB7C13AA3833A1DAEADDB1144CCE55
                                                                                                                                                                                          SHA1:C01ABC2F16549CAEC6B081448B2CBA88A680E250
                                                                                                                                                                                          SHA-256:61462C325DB0065352D8155307F949869862A86CAC67AD7BB6703F57A7FA2FF3
                                                                                                                                                                                          SHA-512:79EB696164FDDD9B121558C2780E54E295FF2DC4D8E87A0DE507B4F2925612721A98FF5010199CB68CF894ACA7A07884E9E02F3DC1E078D241431E3DC884C0A1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset pl DAYS_OF_WEEK_ABBREV [list \.. "N"\.. "Pn"\.. "Wt"\.. "\u015ar"\.. "Cz"\.. "Pt"\.. "So"].. ::msgcat::mcset pl DAYS_OF_WEEK_FULL [list \.. "niedziela"\.. "poniedzia\u0142ek"\.. "wtorek"\.. "\u015broda"\.. "czwartek"\.. "pi\u0105tek"\.. "sobota"].. ::msgcat::mcset pl MONTHS_ABBREV [list \.. "sty"\.. "lut"\.. "mar"\.. "kwi"\.. "maj"\.. "cze"\.. "lip"\.. "sie"\.. "wrz"\.. "pa\u017a"\.. "lis"\.. "gru"\.. ""].. ::msgcat::mcset pl MONTHS_FULL [list \.. "stycze\u0144"\.. "luty"\.. "marzec"\.. "kwiecie\u0144"\.. "maj"\.. "czerwiec"\.. "lipiec"\.. "sierpie\u0144"\.. "wrzesie\u0144"\.. "pa\u017adziernik"\.. "listopad"\..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1177
                                                                                                                                                                                          Entropy (8bit):4.394980756969744
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83CYkjBc1yHYJt//0/I31YMY47flV7YaqgCyt9Fo8g6Gtvt76svi:43C5LHcNnxJ9Ltg6Gpt76Ki
                                                                                                                                                                                          MD5:8F53B3571DD29E12BD33349CFA32F28F
                                                                                                                                                                                          SHA1:C125E059B8BFE5FECD482D1A1DA50B8678872BF6
                                                                                                                                                                                          SHA-256:6F6EEEDDCF232BDCB952592A144810CED44A1CBB4BCC2C062D5F98D441505380
                                                                                                                                                                                          SHA-512:5CD7E7097B720E5399795126A71348816CBA697FD8F14160779E982ADAB00D5994978E2F9445785B0DE62F6F14232278AD1A65BC53730CA58D676B057F0BC406
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset pt DAYS_OF_WEEK_ABBREV [list \.. "Dom"\.. "Seg"\.. "Ter"\.. "Qua"\.. "Qui"\.. "Sex"\.. "S\u00e1b"].. ::msgcat::mcset pt DAYS_OF_WEEK_FULL [list \.. "Domingo"\.. "Segunda-feira"\.. "Ter\u00e7a-feira"\.. "Quarta-feira"\.. "Quinta-feira"\.. "Sexta-feira"\.. "S\u00e1bado"].. ::msgcat::mcset pt MONTHS_ABBREV [list \.. "Jan"\.. "Fev"\.. "Mar"\.. "Abr"\.. "Mai"\.. "Jun"\.. "Jul"\.. "Ago"\.. "Set"\.. "Out"\.. "Nov"\.. "Dez"\.. ""].. ::msgcat::mcset pt MONTHS_FULL [list \.. "Janeiro"\.. "Fevereiro"\.. "Mar\u00e7o"\.. "Abril"\.. "Maio"\.. "Junho"\.. "Julho"\.. "Agosto"\.. "Setembro"\.. "Outubro"\.. "Novembro"\.. "Dezembro"
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):286
                                                                                                                                                                                          Entropy (8bit):4.8608779725401785
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xofm6GPWWjofAW3vLjofAW3v6mjofm6T+3vnFDoAkvn:4EnLB383+NGdg93vk93v6fNK3v9dmn
                                                                                                                                                                                          MD5:A2626EA95C2480FEA68906AE6A1F6993
                                                                                                                                                                                          SHA1:A0592902337C00FC2E70B1DFB3A42453A86535BB
                                                                                                                                                                                          SHA-256:320BE7D5B730091E6FA35F196314737261C8E154577DCF6AC8C2057D44394AD7
                                                                                                                                                                                          SHA-512:9801A87D024565676D4F3EAF0702C213E59FC2B6719D8BE95C19C9ED53FC43487F65F5408378B401A2B4C2BD4E2E391C2D848CA87739A6082AB7766EC6B9EFE1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset pt_BR DATE_FORMAT "%d-%m-%Y".. ::msgcat::mcset pt_BR TIME_FORMAT "%T".. ::msgcat::mcset pt_BR TIME_FORMAT_12 "%T".. ::msgcat::mcset pt_BR DATE_TIME_FORMAT "%a %d %b %Y %T %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1224
                                                                                                                                                                                          Entropy (8bit):4.350784108088039
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83coPUMSeZmkTMm41icpK+7ZVoImEcVUCWdvHvWIn:43lPHFmkm1iMVoxEc+CWZPWIn
                                                                                                                                                                                          MD5:F6575EC17966320106FF7ABDFB3186E2
                                                                                                                                                                                          SHA1:68C6B72D664FDA27450FCE8B5734AB627CE825D7
                                                                                                                                                                                          SHA-256:25ED6AC7A353E23B954B98611AE3B7E56BDCF2B0CB0DB358253CFB8BEBBB831C
                                                                                                                                                                                          SHA-512:E564543231922A17C898419545BFA65E5E31FE9F005FDD201B735CFDE08E96FB3B98349C2A7959E29CA8F7E6934B0C4C6DE6B5E67209D0DD9A7746DFEBF037B3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ro DAYS_OF_WEEK_ABBREV [list \.. "D"\.. "L"\.. "Ma"\.. "Mi"\.. "J"\.. "V"\.. "S"].. ::msgcat::mcset ro DAYS_OF_WEEK_FULL [list \.. "duminic\u0103"\.. "luni"\.. "mar\u0163i"\.. "miercuri"\.. "joi"\.. "vineri"\.. "s\u00eemb\u0103t\u0103"].. ::msgcat::mcset ro MONTHS_ABBREV [list \.. "Ian"\.. "Feb"\.. "Mar"\.. "Apr"\.. "Mai"\.. "Iun"\.. "Iul"\.. "Aug"\.. "Sep"\.. "Oct"\.. "Nov"\.. "Dec"\.. ""].. ::msgcat::mcset ro MONTHS_FULL [list \.. "ianuarie"\.. "februarie"\.. "martie"\.. "aprilie"\.. "mai"\.. "iunie"\.. "iulie"\.. "august"\.. "septembrie"\.. "octombrie"\.. "noiembrie"\.. "decembrie"\.. ""].. ::msgcat:
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2091
                                                                                                                                                                                          Entropy (8bit):4.2886524607041006
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:43D+pQ7keidQfRQPgQHB81Z/sFIAZSQWQXQrQxJQjQRnQBFQiWftkWt:26pgkeoSnpjA4tMYiJcCMFmVRt
                                                                                                                                                                                          MD5:9F1C8DD58550558977821FD500E7C0E0
                                                                                                                                                                                          SHA1:EFDD809BC2872A5BE0E353D31BE6D7D72E4B829C
                                                                                                                                                                                          SHA-256:BB35BB6F07BAEF72C329EC3E95D6527A2736070EE2FFE5DE227E1FF0332390F8
                                                                                                                                                                                          SHA-512:AA3C5C40AE9D342F8287958355C3321CF60566AD3E84E3D18D782FC022A998DA275506A61010A65D2E7D7578F2919C47C63AB0BA63A38800AA48D4B88ACE54D3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ru DAYS_OF_WEEK_ABBREV [list \.. "\u0412\u0441"\.. "\u041f\u043d"\.. "\u0412\u0442"\.. "\u0421\u0440"\.. "\u0427\u0442"\.. "\u041f\u0442"\.. "\u0421\u0431"].. ::msgcat::mcset ru DAYS_OF_WEEK_FULL [list \.. "\u0432\u043e\u0441\u043a\u0440\u0435\u0441\u0435\u043d\u044c\u0435"\.. "\u043f\u043e\u043d\u0435\u0434\u0435\u043b\u044c\u043d\u0438\u043a"\.. "\u0432\u0442\u043e\u0440\u043d\u0438\u043a"\.. "\u0441\u0440\u0435\u0434\u0430"\.. "\u0447\u0435\u0442\u0432\u0435\u0440\u0433"\.. "\u043f\u044f\u0442\u043d\u0438\u0446\u0430"\.. "\u0441\u0443\u0431\u0431\u043e\u0442\u0430"].. ::msgcat::mcset ru MONTHS_ABBREV [list \.. "\u044f\u043d\u0432"\.. "\u0444\u0435\u0432"\.. "\u043c\u0430\u0440"\.. "\u0430\u043f\u0440"\.. "\u043c\u0430\u0439"\.. "\u0438\u044e\u
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):248
                                                                                                                                                                                          Entropy (8bit):4.9420431225061
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoVAgWIZoVY9X3vtfNrsoVA9+3vW6Q9vn:4EnLB383SFWIyaX3vtNl/3vWHNn
                                                                                                                                                                                          MD5:DC98D88964650E302BE97FDB3B33326E
                                                                                                                                                                                          SHA1:1DDDCC4265D7B980B867FEE674BEF2FD87D823F7
                                                                                                                                                                                          SHA-256:13E4E79A0ED82034BADE0CFF8DEF5DE1222F6968108AD710662BDB7DAF36D7E1
                                                                                                                                                                                          SHA-512:F3B9D528C529DD520FEDA3C20ED354E521C5B3C29F3317E15B7939CE06A3D67554D34DD6E54FE038585E46C560C604A1FD7E7F84914086B5994D52CE2C9E99CE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ru_UA DATE_FORMAT "%d.%m.%Y".. ::msgcat::mcset ru_UA TIME_FORMAT "%k:%M:%S".. ::msgcat::mcset ru_UA DATE_TIME_FORMAT "%d.%m.%Y %k:%M:%S %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1212
                                                                                                                                                                                          Entropy (8bit):4.359036493565628
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83/YIXo4YY0dD6kMm7fX2NaSIvZdHZgHZ/IxvaGWxvtl9svWTN:43rLTR44/yWltOWB
                                                                                                                                                                                          MD5:E297221FA73BD78577B398BC7D061D21
                                                                                                                                                                                          SHA1:F2A6B456272F913A9E97C495CEE73AC774C90FA1
                                                                                                                                                                                          SHA-256:E65D6E5E837DF0A2DF0DB77BCE45334BBC27EFFF9023C37119E75D49932D9D6C
                                                                                                                                                                                          SHA-512:AB9DDAE7CB21193C7753041F0B88CF2D40987E7E604B47816219458D217F084AA4EBF36719E22AAB3FD71A271D9F956ADC353182991903D7ADE8C8F00F6B2F9B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset sh DAYS_OF_WEEK_ABBREV [list \.. "Ned"\.. "Pon"\.. "Uto"\.. "Sre"\.. "\u010cet"\.. "Pet"\.. "Sub"].. ::msgcat::mcset sh DAYS_OF_WEEK_FULL [list \.. "Nedelja"\.. "Ponedeljak"\.. "Utorak"\.. "Sreda"\.. "\u010cetvrtak"\.. "Petak"\.. "Subota"].. ::msgcat::mcset sh MONTHS_ABBREV [list \.. "Jan"\.. "Feb"\.. "Mar"\.. "Apr"\.. "Maj"\.. "Jun"\.. "Jul"\.. "Avg"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Dec"\.. ""].. ::msgcat::mcset sh MONTHS_FULL [list \.. "Januar"\.. "Februar"\.. "Mart"\.. "April"\.. "Maj"\.. "Juni"\.. "Juli"\.. "Avgust"\.. "Septembar"\.. "Oktobar"\.. "Novembar"\.. "Decembar"\.. ""].. ::msgcat::mcset sh BC
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1255
                                                                                                                                                                                          Entropy (8bit):4.4043119723436135
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83c46o40u3rIsmJIcm93ApLDVb2IcU95WFGEXF3eUCvtz/v3e6:43c3ow3rF93Ap7tEXFREtznp
                                                                                                                                                                                          MD5:24DA40901D907D35195CC1B3A675EBC7
                                                                                                                                                                                          SHA1:8AF31248F06FADA5CFB0D83A940CFF5CE70E2577
                                                                                                                                                                                          SHA-256:976813F6C53C9BEBBF976B0F560FD7FC5E4EC4C574D7E1CD31F9A4056765CB7A
                                                                                                                                                                                          SHA-512:A9BC6AAFE9AEEDFD1E483E54A2D27871A09ADD6807D8F90410CD2BB82A91BA9DF435652EC9A7C3AD0A080D7F153CA848BB47DAD3936BA30E4AEFF3C474C433CC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset sk DAYS_OF_WEEK_ABBREV [list \.. "Ne"\.. "Po"\.. "Ut"\.. "St"\.. "\u0160t"\.. "Pa"\.. "So"].. ::msgcat::mcset sk DAYS_OF_WEEK_FULL [list \.. "Nede\u013ee"\.. "Pondelok"\.. "Utorok"\.. "Streda"\.. "\u0160tvrtok"\.. "Piatok"\.. "Sobota"].. ::msgcat::mcset sk MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "m\u00e1j"\.. "j\u00fan"\.. "j\u00fal"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "dec"\.. ""].. ::msgcat::mcset sk MONTHS_FULL [list \.. "janu\u00e1r"\.. "febru\u00e1r"\.. "marec"\.. "apr\u00edl"\.. "m\u00e1j"\.. "j\u00fan"\.. "j\u00fal"\.. "august"\.. "september"\.. "okt\u00f3ber"\.. "november"\.. "decem
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1216
                                                                                                                                                                                          Entropy (8bit):4.333705818952628
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83MIXpC9opYuGS/BrIsmZ5hv1yAxyIVjd392WFThENvt0vJoO:43fXYujZrqyApYJtyR
                                                                                                                                                                                          MD5:CB76F54CBE0D1AAE8BA956B4C51CBD2A
                                                                                                                                                                                          SHA1:C1F78375EDB0BD2504553E33B2024C0C63FDB1B2
                                                                                                                                                                                          SHA-256:11A6264676DBED87E4F718075127E32E107854F35F141642454F484984084486
                                                                                                                                                                                          SHA-512:69964348FF08DE6EEB5E3DD61057FF0DF5441105EB7BEE7FB7E9AC5E26DCC164E3C7C011CA5CD7BC5B97A7872532331C97CCBC80563F6C5A3548014BFA8BEF16
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset sl DAYS_OF_WEEK_ABBREV [list \.. "Ned"\.. "Pon"\.. "Tor"\.. "Sre"\.. "\u010cet"\.. "Pet"\.. "Sob"].. ::msgcat::mcset sl DAYS_OF_WEEK_FULL [list \.. "Nedelja"\.. "Ponedeljek"\.. "Torek"\.. "Sreda"\.. "\u010cetrtek"\.. "Petek"\.. "Sobota"].. ::msgcat::mcset sl MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "maj"\.. "jun"\.. "jul"\.. "avg"\.. "sep"\.. "okt"\.. "nov"\.. "dec"\.. ""].. ::msgcat::mcset sl MONTHS_FULL [list \.. "januar"\.. "februar"\.. "marec"\.. "april"\.. "maj"\.. "junij"\.. "julij"\.. "avgust"\.. "september"\.. "oktober"\.. "november"\.. "december"\.. ""].. ::msgcat::mcset sl B
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1321
                                                                                                                                                                                          Entropy (8bit):4.408176575111904
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83F7ONQEwXwjjTlVoSEh76W/X+WZQJ4hv+H6v2V:43NwjPEwl4VQ8q
                                                                                                                                                                                          MD5:E606F620F03EC0FBDBE6551601299C5F
                                                                                                                                                                                          SHA1:0B50AB679E8D90D8E7319BCADAC426E004594D3B
                                                                                                                                                                                          SHA-256:1F4EFD78F6B45B65F73F09B2F52FC13C2A7C4138DCB7664804878D197B6EBDF9
                                                                                                                                                                                          SHA-512:08AF2B51EB7111E334ADDA3A03F9A8816C104E9742B523EC363FB5131A3DF73D298A8DDCD573D23C23C65CCFD2B8898DF75AE3D4F04BF80744044FB6BAB5EC0A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset sq DAYS_OF_WEEK_ABBREV [list \.. "Die"\.. "H\u00ebn"\.. "Mar"\.. "M\u00ebr"\.. "Enj"\.. "Pre"\.. "Sht"].. ::msgcat::mcset sq DAYS_OF_WEEK_FULL [list \.. "e diel"\.. "e h\u00ebn\u00eb"\.. "e mart\u00eb"\.. "e m\u00ebrkur\u00eb"\.. "e enjte"\.. "e premte"\.. "e shtun\u00eb"].. ::msgcat::mcset sq MONTHS_ABBREV [list \.. "Jan"\.. "Shk"\.. "Mar"\.. "Pri"\.. "Maj"\.. "Qer"\.. "Kor"\.. "Gsh"\.. "Sht"\.. "Tet"\.. "N\u00ebn"\.. "Dhj"\.. ""].. ::msgcat::mcset sq MONTHS_FULL [list \.. "janar"\.. "shkurt"\.. "mars"\.. "prill"\.. "maj"\.. "qershor"\.. "korrik"\.. "gusht"\.. "shtator"\.. "tetor"\.. "n\u00ebntor"\.. "dhjetor"\.
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2087
                                                                                                                                                                                          Entropy (8bit):4.307749748884122
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:43ilQTSBQrQP9QenzMKSFD9NI/QiNQEQrQL1KKYjU5rtAx:2I5EyLMKSFZNIYMzYMKKiqW
                                                                                                                                                                                          MD5:BF363AB60B57F6D8FDCDBFD230A28DDF
                                                                                                                                                                                          SHA1:6375CBA0A2197DA7E65BEE45C42F02C4F0B9142D
                                                                                                                                                                                          SHA-256:FA00A7B22C9941F6C2B893F22B703DCB159CA2F2E4005FD6A74A632AEB786BFA
                                                                                                                                                                                          SHA-512:91AD8085EF321A5A0E4D2ED204940CB66E8E230BBEDE59A8A07D1CEED9155FCC6B075A1FCC44AE834C1FEEEB3A59256C4310684C5AC453D4C50DFABD88469814
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset sr DAYS_OF_WEEK_ABBREV [list \.. "\u041d\u0435\u0434"\.. "\u041f\u043e\u043d"\.. "\u0423\u0442\u043e"\.. "\u0421\u0440\u0435"\.. "\u0427\u0435\u0442"\.. "\u041f\u0435\u0442"\.. "\u0421\u0443\u0431"].. ::msgcat::mcset sr DAYS_OF_WEEK_FULL [list \.. "\u041d\u0435\u0434\u0435\u0459\u0430"\.. "\u041f\u043e\u043d\u0435\u0434\u0435\u0459\u0430\u043a"\.. "\u0423\u0442\u043e\u0440\u0430\u043a"\.. "\u0421\u0440\u0435\u0434\u0430"\.. "\u0427\u0435\u0442\u0432\u0440\u0442\u0430\u043a"\.. "\u041f\u0435\u0442\u0430\u043a"\.. "\u0421\u0443\u0431\u043e\u0442\u0430"].. ::msgcat::mcset sr MONTHS_ABBREV [list \.. "\u0408\u0430\u043d"\.. "\u0424\u0435\u0431"\.. "\u041c\u0430\u0440"\.. "\u0410\u043f\u0440"\.. "\u041c\u0430\u0458"\.. "\u0408\u0443\u043d"\.. "\
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1219
                                                                                                                                                                                          Entropy (8bit):4.3542418837714285
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83qoLt6yLQoAusrIsmZ5m4AcjTHX92WFfjr4MvBvX:43ZLxQNusrr4Aw3Jkq1X
                                                                                                                                                                                          MD5:3B5C3FFA0829768470BDA1B46D882060
                                                                                                                                                                                          SHA1:C96799036EC5CCDE799A6B50CD7748908935A2F3
                                                                                                                                                                                          SHA-256:483916B51BD7E071E88F9EC36AAF3E08FEA823991532F832DE491C6C40B55A9F
                                                                                                                                                                                          SHA-512:684FA249123878AA7F856DF0FD3B0D9F041113CFEA8EEFA47D0E1948DA23694330BF0D62BA896A3891CD559C16CAE9330BF31508F530AC003D2929D5FD9246D8
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset sv DAYS_OF_WEEK_ABBREV [list \.. "s\u00f6"\.. "m\u00e5"\.. "ti"\.. "on"\.. "to"\.. "fr"\.. "l\u00f6"].. ::msgcat::mcset sv DAYS_OF_WEEK_FULL [list \.. "s\u00f6ndag"\.. "m\u00e5ndag"\.. "tisdag"\.. "onsdag"\.. "torsdag"\.. "fredag"\.. "l\u00f6rdag"].. ::msgcat::mcset sv MONTHS_ABBREV [list \.. "jan"\.. "feb"\.. "mar"\.. "apr"\.. "maj"\.. "jun"\.. "jul"\.. "aug"\.. "sep"\.. "okt"\.. "nov"\.. "dec"\.. ""].. ::msgcat::mcset sv MONTHS_FULL [list \.. "januari"\.. "februari"\.. "mars"\.. "april"\.. "maj"\.. "juni"\.. "juli"\.. "augusti"\.. "september"\.. "oktober"\.. "november"\.. "december"\.. ""].. ::msgcat:
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1040
                                                                                                                                                                                          Entropy (8bit):4.108744949579904
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:4EnLB383A4mScvhkzoR4mtuWckRkoay3UVxMmALfG7IdzVJ633xRCPLMYMvYo76u:4aR83/Shkz1uckO76kMmEf62qOTdMvvn
                                                                                                                                                                                          MD5:5774860C8AEECBD48F1502E616158CAB
                                                                                                                                                                                          SHA1:DE7059713EA7913A0C79F5386833CE2BCAD2CFD7
                                                                                                                                                                                          SHA-256:1DA068C9AA02EF14A2440758C6040D632D96044A20EC501DBB9E40D8592E0E7F
                                                                                                                                                                                          SHA-512:91E69222DDF55E9E0E389DB77D7A0F2E082351DC3FB34A1A2C1E350E4187E8BB940F6C2EDE1B8651159C2787AA0BE4D7268F33F7A82CAED03514FCE462530408
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset sw DAYS_OF_WEEK_ABBREV [list \.. "Jpi"\.. "Jtt"\.. "Jnn"\.. "Jtn"\.. "Alh"\.. "Iju"\.. "Jmo"].. ::msgcat::mcset sw DAYS_OF_WEEK_FULL [list \.. "Jumapili"\.. "Jumatatu"\.. "Jumanne"\.. "Jumatano"\.. "Alhamisi"\.. "Ijumaa"\.. "Jumamosi"].. ::msgcat::mcset sw MONTHS_ABBREV [list \.. "Jan"\.. "Feb"\.. "Mar"\.. "Apr"\.. "Mei"\.. "Jun"\.. "Jul"\.. "Ago"\.. "Sep"\.. "Okt"\.. "Nov"\.. "Des"\.. ""].. ::msgcat::mcset sw MONTHS_FULL [list \.. "Januari"\.. "Februari"\.. "Machi"\.. "Aprili"\.. "Mei"\.. "Juni"\.. "Julai"\.. "Agosti"\.. "Septemba"\.. "Oktoba"\.. "Novemba"\.. "Desemba"\.. ""].. ::msgcat::mcset sw BCE "
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1874
                                                                                                                                                                                          Entropy (8bit):4.080580566597515
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83AI0xnJdnQhmHlHYPKtul+eOPfIxyH5ztUSLu8tptLtrl+eOPfIxyH5ztUSU:43N0dQmHlHYPKtu1HxMtr1Hx/
                                                                                                                                                                                          MD5:85288236C3997302EA26D7403BBA2C15
                                                                                                                                                                                          SHA1:05AB389CC4DCF17B37BFF6ED1ECD58D6E9850A01
                                                                                                                                                                                          SHA-256:AEFDC4255890D5B3FFE5CEE1B457B7D711283C2287ABA644155C10956012F6C1
                                                                                                                                                                                          SHA-512:8E389D46606176EE14B8356153095B49C9426B80139B672A620F488891F091D1A272D4FB116775900E4AB4EC84DDDEBD8D6AF81AC672F14F148F2BFC638D2B10
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ta DAYS_OF_WEEK_FULL [list \.. "\u0b9e\u0bbe\u0baf\u0bbf\u0bb1\u0bc1"\.. "\u0ba4\u0bbf\u0b99\u0bcd\u0b95\u0bb3\u0bcd"\.. "\u0b9a\u0bc6\u0bb5\u0bcd\u0bb5\u0bbe\u0baf\u0bcd"\.. "\u0baa\u0bc1\u0ba4\u0ba9\u0bcd"\.. "\u0bb5\u0bbf\u0baf\u0bbe\u0bb4\u0ba9\u0bcd"\.. "\u0bb5\u0bc6\u0bb3\u0bcd\u0bb3\u0bbf"\.. "\u0b9a\u0ba9\u0bbf"].. ::msgcat::mcset ta MONTHS_ABBREV [list \.. "\u0b9c\u0ba9\u0bb5\u0bb0\u0bbf"\.. "\u0baa\u0bc6\u0baa\u0bcd\u0bb0\u0bb5\u0bb0\u0bbf"\.. "\u0bae\u0bbe\u0bb0\u0bcd\u0b9a\u0bcd"\.. "\u0b8f\u0baa\u0bcd\u0bb0\u0bb2\u0bcd"\.. "\u0bae\u0bc7"\.. "\u0b9c\u0bc2\u0ba9\u0bcd"\.. "\u0b9c\u0bc2\u0bb2\u0bc8"\.. "\u0b86\u0b95\u0bb8\u0bcd\u0b9f\u0bcd"\.. "\u0b9a\u0bc6\u0baa\u0bcd\u0b9f\u0bae\u0bcd\u0baa\u0bb0\u0bcd"\.. "\u0b85\u0b95\u0bcd\u0b9f\u0bcb\u0baa\u0bb0\u0bcd"\.
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):257
                                                                                                                                                                                          Entropy (8bit):4.863003494480733
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xosDv+IZosK3v6ry/5osDo+3v+6f6HyFvn:4EnLB383ZDvl5K3v6ry/ZDF3vmSVn
                                                                                                                                                                                          MD5:CF078352DA0507C767F04E31D6C14296
                                                                                                                                                                                          SHA1:0A9B1255BD85B60D3620AE61370F54748AB7A182
                                                                                                                                                                                          SHA-256:4978A193076DE56944236F7F1DCECACFF739536DFB3DBEFC1F7FE2B97A8AEAF4
                                                                                                                                                                                          SHA-512:6FFC85B2A8DECB373EC76B1CD1A9459A30E443319F2C8DB9BBE6E115F5EFEEBAC314D4E8BE996EA55EE46466C6F6057A73078F5FDCF1C4CBAF1A270E45BC10C0
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset ta_IN DATE_FORMAT "%d %M %Y".. ::msgcat::mcset ta_IN TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset ta_IN DATE_TIME_FORMAT "%d %M %Y %I:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2149
                                                                                                                                                                                          Entropy (8bit):4.097884113767283
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:43a8mxI9k3JR0UjjFbPcniLHVktjjFbPcniLHVM:2a8v9k3JdbPcIidbPcIG
                                                                                                                                                                                          MD5:61E4CB2AAD66285E9113071057F39C35
                                                                                                                                                                                          SHA1:A2BD21090859669C4B6A875E077825381B7E2702
                                                                                                                                                                                          SHA-256:9E96C7123100234A7018533764502985A208F2EB3314F5B6332D46016725A63F
                                                                                                                                                                                          SHA-512:589A2D65508B07B5FDEDA883F71A4B496B25458CA1ECE7C4D4F5DAE82EB683DA82C8E21E57D63A235AB600174C9D362A746B2E27BAA6E3ADE1B7BD9D6000BE27
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset te DAYS_OF_WEEK_ABBREV [list \.. "\u0c06\u0c26\u0c3f"\.. "\u0c38\u0c4b\u0c2e"\.. "\u0c2e\u0c02\u0c17\u0c33"\.. "\u0c2c\u0c41\u0c27"\.. "\u0c17\u0c41\u0c30\u0c41"\.. "\u0c36\u0c41\u0c15\u0c4d\u0c30"\.. "\u0c36\u0c28\u0c3f"].. ::msgcat::mcset te DAYS_OF_WEEK_FULL [list \.. "\u0c06\u0c26\u0c3f\u0c35\u0c3e\u0c30\u0c02"\.. "\u0c38\u0c4b\u0c2e\u0c35\u0c3e\u0c30\u0c02"\.. "\u0c2e\u0c02\u0c17\u0c33\u0c35\u0c3e\u0c30\u0c02"\.. "\u0c2c\u0c41\u0c27\u0c35\u0c3e\u0c30\u0c02"\.. "\u0c17\u0c41\u0c30\u0c41\u0c35\u0c3e\u0c30\u0c02"\.. "\u0c36\u0c41\u0c15\u0c4d\u0c30\u0c35\u0c3e\u0c30\u0c02"\.. "\u0c36\u0c28\u0c3f\u0c35\u0c3e\u0c30\u0c02"].. ::msgcat::mcset te MONTHS_ABBREV [list \.. "\u0c1c\u0c28\u0c35\u0c30\u0c3f"\.. "\u0c2b\u0c3f\u0c2c\u0c4d\u0c30\u0c35\u0c30\u0c3f"\.. "\u0c2e\u0c3
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):419
                                                                                                                                                                                          Entropy (8bit):5.058324650031252
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:4EnLB383LjZWsn0sHjoD0savzda3v6ry/ZF3vMSVn:4aR833Z1nnHjoDnavzd8vSCZNvMSV
                                                                                                                                                                                          MD5:BCA040A356E7E8CC597EFB9B9065F8E1
                                                                                                                                                                                          SHA1:ADAF7EC8C2035BC06E168D3F1BD7F39277E9273F
                                                                                                                                                                                          SHA-256:B110FEEDDA21ECCEFA624BEF8E1476E9F221FB253880AC370967AE4D0237CA7A
                                                                                                                                                                                          SHA-512:D408ECE8CF89FB23B45420D3CBA7655EEE713498210889A84EE25D3417360705546D97028EAAAA47764B6E9B0A3699669B98C0A53861A38E0DFCB9F3B8A47BEC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset te_IN AM "\u0c2a\u0c42\u0c30\u0c4d\u0c35\u0c3e\u0c39\u0c4d\u0c28".. ::msgcat::mcset te_IN PM "\u0c05\u0c2a\u0c30\u0c3e\u0c39\u0c4d\u0c28".. ::msgcat::mcset te_IN DATE_FORMAT "%d/%m/%Y".. ::msgcat::mcset te_IN TIME_FORMAT_12 "%I:%M:%S %P".. ::msgcat::mcset te_IN DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2359
                                                                                                                                                                                          Entropy (8bit):4.382796122808316
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:439X4QKPQJecQwFA0P9JmDsxQ7KHfWkD2CQM0DnWxFDzCYmdrtVP:29ohCi1028QmHfIC4jW3DmHB
                                                                                                                                                                                          MD5:7F61E1EA256D78948189EF07119663CD
                                                                                                                                                                                          SHA1:6867E9780049FACE9984B7788B6F362B8D1AD718
                                                                                                                                                                                          SHA-256:48BEAF693BF5B6EED15234DB0D375B97E6D576A749E9048420C153E6CAFC0259
                                                                                                                                                                                          SHA-512:F3E24E0B41A7D722AC2FA0E429A2DCB1CCB5BAECC9912ADF6AF79C51366EA1AC9F931F0F44F068F3CEE6873516E6223CC5E7616CF523B1DFB9E528DE4D58454A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset th DAYS_OF_WEEK_ABBREV [list \.. "\u0e2d\u0e32."\.. "\u0e08."\.. "\u0e2d."\.. "\u0e1e."\.. "\u0e1e\u0e24."\.. "\u0e28."\.. "\u0e2a."].. ::msgcat::mcset th DAYS_OF_WEEK_FULL [list \.. "\u0e27\u0e31\u0e19\u0e2d\u0e32\u0e17\u0e34\u0e15\u0e22\u0e4c"\.. "\u0e27\u0e31\u0e19\u0e08\u0e31\u0e19\u0e17\u0e23\u0e4c"\.. "\u0e27\u0e31\u0e19\u0e2d\u0e31\u0e07\u0e04\u0e32\u0e23"\.. "\u0e27\u0e31\u0e19\u0e1e\u0e38\u0e18"\.. "\u0e27\u0e31\u0e19\u0e1e\u0e24\u0e2b\u0e31\u0e2a\u0e1a\u0e14\u0e35"\.. "\u0e27\u0e31\u0e19\u0e28\u0e38\u0e01\u0e23\u0e4c"\.. "\u0e27\u0e31\u0e19\u0e40\u0e2a\u0e32\u0e23\u0e4c"].. ::msgcat::mcset th MONTHS_ABBREV [list \.. "\u0e21.\u0e04."\.. "\u0e01.\u0e1e."\.. "\u0e21\u0e35.\u0e04."\.. "\u0e40\u0e21.\u0e22."\.. "\u0e1e.\u0e04."\.. "\u0e21\u0
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1183
                                                                                                                                                                                          Entropy (8bit):4.390397293529625
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR83ZVUflVdq4qTr6dyX59508THHCh5LbQgWiNv9KvWIn:43PXTtbTngLhWiJGWIn
                                                                                                                                                                                          MD5:017F0F989BD5DBBF25E7C797CE09C45C
                                                                                                                                                                                          SHA1:162922DBD55A31A74410375A36EE7BC50E092BDD
                                                                                                                                                                                          SHA-256:4B85B345D6C43F7257C6849A60A492397FD5FD9D82DF3A2252189D7A1ECCBB64
                                                                                                                                                                                          SHA-512:73B6CF395753D863330687404E8A584CB08B81A8CC456DCE7BB49C4EA15EA19E45E3CC1E1367E10915DE14AC6258383289BCFEF55AD2768A50889DF390D37EF9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset tr DAYS_OF_WEEK_ABBREV [list \.. "Paz"\.. "Pzt"\.. "Sal"\.. "\u00c7ar"\.. "Per"\.. "Cum"\.. "Cmt"].. ::msgcat::mcset tr DAYS_OF_WEEK_FULL [list \.. "Pazar"\.. "Pazartesi"\.. "Sal\u0131"\.. "\u00c7ar\u015famba"\.. "Per\u015fembe"\.. "Cuma"\.. "Cumartesi"].. ::msgcat::mcset tr MONTHS_ABBREV [list \.. "Oca"\.. "\u015eub"\.. "Mar"\.. "Nis"\.. "May"\.. "Haz"\.. "Tem"\.. "A\u011fu"\.. "Eyl"\.. "Eki"\.. "Kas"\.. "Ara"\.. ""].. ::msgcat::mcset tr MONTHS_FULL [list \.. "Ocak"\.. "\u015eubat"\.. "Mart"\.. "Nisan"\.. "May\u0131s"\.. "Haziran"\.. "Temmuz"\.. "A\u011fustos"\.. "Eyl\u00fcl"\.. "Ekim"\.. "Kas\u0131m"\.. "Aral\u
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2165
                                                                                                                                                                                          Entropy (8bit):4.289021158621493
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:436yILgoQjQPxUIkgPDRQnQ0vVQbC1iQwweIgWQDIoZI7QDI3QbI87IVQnIzQ7mh:2AzUe3EhV8CYgrbH7z3fLVTzgn5jyX7p
                                                                                                                                                                                          MD5:323BD95809A44B0BADC71AD36E5F095B
                                                                                                                                                                                          SHA1:44F6016873CA955D27545C56CCD24BDB06A83C43
                                                                                                                                                                                          SHA-256:7093DA7E39CEB6D3F51EB6CF1CCA2D7F3680ED7B8FE4A5F0CECEEF6BEB21AC77
                                                                                                                                                                                          SHA-512:DB16E0E2D17CE47673DE781A7171944C14CC550FB8EB0920C05B979E4D067E36DF0B59B8BFA81F82D8FCE1FFDDAAD2755E68BFE5BC0DBB11E8716A4D18BA5F7E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset uk DAYS_OF_WEEK_ABBREV [list \.. "\u043d\u0434"\.. "\u043f\u043d"\.. "\u0432\u0442"\.. "\u0441\u0440"\.. "\u0447\u0442"\.. "\u043f\u0442"\.. "\u0441\u0431"].. ::msgcat::mcset uk DAYS_OF_WEEK_FULL [list \.. "\u043d\u0435\u0434\u0456\u043b\u044f"\.. "\u043f\u043e\u043d\u0435\u0434\u0456\u043b\u043e\u043a"\.. "\u0432\u0456\u0432\u0442\u043e\u0440\u043e\u043a"\.. "\u0441\u0435\u0440\u0435\u0434\u0430"\.. "\u0447\u0435\u0442\u0432\u0435\u0440"\.. "\u043f'\u044f\u0442\u043d\u0438\u0446\u044f"\.. "\u0441\u0443\u0431\u043e\u0442\u0430"].. ::msgcat::mcset uk MONTHS_ABBREV [list \.. "\u0441\u0456\u0447"\.. "\u043b\u044e\u0442"\.. "\u0431\u0435\u0440"\.. "\u043a\u0432\u0456\u0442"\.. "\u0442\u0440\u0430\u0432"\.. "\u0447\u0435\u0440\u0432"\.. "\u043b
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1471
                                                                                                                                                                                          Entropy (8bit):4.44729506678271
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:4aR836DNjYTP55YAUy2tJ9kyzW68IFYHMBSW1K1pvhv1O:43dbYJyC8ySgI1dV1O
                                                                                                                                                                                          MD5:C127F54C462917D3B3EEF5F29F612138
                                                                                                                                                                                          SHA1:B1D9A67F856D93F98524C6372B352EA0DE1B9CD3
                                                                                                                                                                                          SHA-256:E9B7AECD456F1D2288604C982B5DED0DCF71DCA968C0B0EAFF4CA16CC3B73EC2
                                                                                                                                                                                          SHA-512:0B0F132F10580751258D37E070338C3B39DF57FDECDB9D0AFA67E90D6766DDCB4D711876E551ED759D177F1B8F4E9E1DD8F7899F7CB57F8039F55EC4C2984E87
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset vi DAYS_OF_WEEK_ABBREV [list \.. "Th 2"\.. "Th 3"\.. "Th 4"\.. "Th 5"\.. "Th 6"\.. "Th 7"\.. "CN"].. ::msgcat::mcset vi DAYS_OF_WEEK_FULL [list \.. "Th\u01b0\u0301 hai"\.. "Th\u01b0\u0301 ba"\.. "Th\u01b0\u0301 t\u01b0"\.. "Th\u01b0\u0301 n\u0103m"\.. "Th\u01b0\u0301 s\u00e1u"\.. "Th\u01b0\u0301 ba\u0309y"\.. "Chu\u0309 nh\u00e2\u0323t"].. ::msgcat::mcset vi MONTHS_ABBREV [list \.. "Thg 1"\.. "Thg 2"\.. "Thg 3"\.. "Thg 4"\.. "Thg 5"\.. "Thg 6"\.. "Thg 7"\.. "Thg 8"\.. "Thg 9"\.. "Thg 10"\.. "Thg 11"\.. "Thg 12"\.. ""].. ::msgcat::mcset vi MONTHS_FULL [list \.. "Th\u00e1ng m\u00f4\u0323t"\.. "Th\u00e1ng hai"\.. "Th\u00e1ng ba"\.. "Th\u00e1ng t\u01b0"\.. "Th\u00e
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with very long lines (1598), with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):3385
                                                                                                                                                                                          Entropy (8bit):4.5164095151631125
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:43qrY2BBT7uxDqwPqDa8c3FLbYmhyvMDKbW0YGLuoEyke2gdr:2yPTKdo
                                                                                                                                                                                          MD5:2F356DE14D48B1091DEAA32D20C38D96
                                                                                                                                                                                          SHA1:4AB78D47A73290000955A7C1DFDF7106093F69FD
                                                                                                                                                                                          SHA-256:EB247F5184A59414D3DF7E3ECA51F5998C248CFB27D2C02E62A7A30AB35197A7
                                                                                                                                                                                          SHA-512:602410830018B455C68AE2EBDD83BA561CF59DA5898E00C80CE7EF619912E591EB38B4C8FE8D9B1F024E7105B0C4D2D326FC855F31E79C1B954429B947DFFBB1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset zh DAYS_OF_WEEK_ABBREV [list \.. "\u661f\u671f\u65e5"\.. "\u661f\u671f\u4e00"\.. "\u661f\u671f\u4e8c"\.. "\u661f\u671f\u4e09"\.. "\u661f\u671f\u56db"\.. "\u661f\u671f\u4e94"\.. "\u661f\u671f\u516d"].. ::msgcat::mcset zh DAYS_OF_WEEK_FULL [list \.. "\u661f\u671f\u65e5"\.. "\u661f\u671f\u4e00"\.. "\u661f\u671f\u4e8c"\.. "\u661f\u671f\u4e09"\.. "\u661f\u671f\u56db"\.. "\u661f\u671f\u4e94"\.. "\u661f\u671f\u516d"].. ::msgcat::mcset zh MONTHS_ABBREV [list \.. "\u4e00\u6708"\.. "\u4e8c\u6708"\.. "\u4e09\u6708"\.. "\u56db\u6708"\.. "\u4e94\u6708"\.. "\u516d\u6708"\.. "\u4e03\u6708"\.. "\u516b\u6708"\.. "\u4e5d\u6708"\.. "\u5341\u6708"\.. "\u5341\u4e00\u6708"\.. "\u5341\u4e8c\u6708"\.. ""].. ::msgcat::m
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):319
                                                                                                                                                                                          Entropy (8bit):5.167825099880243
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoX5YBoHJ+3vtfNrsoHJ+3v6MYBoXa+3vYq9vn:4EnLB383U5YMJ+3vtN3J+3v6LcL3vYqN
                                                                                                                                                                                          MD5:9FCDC2E80E13984D434E3CC91E1ED14C
                                                                                                                                                                                          SHA1:710D9EE2A71021F4AB609886138EED43C1380ACD
                                                                                                                                                                                          SHA-256:4C8A855700FEFE8EE21B08030FF4159D8011AE50353F063229C42DE6292475CF
                                                                                                                                                                                          SHA-512:D899A1F58DF1051BB2C2C4AC859C52A2D19B1593C37022A29439B37A8057ADC3941F3564E2E1D9CEB72AE123A4E12E24C3736343AA3A5EC8749AB5AEBBF65085
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset zh_CN DATE_FORMAT "%Y-%m-%e".. ::msgcat::mcset zh_CN TIME_FORMAT "%k:%M:%S".. ::msgcat::mcset zh_CN TIME_FORMAT_12 "%P%I\u65f6%M\u5206%S\u79d2".. ::msgcat::mcset zh_CN DATE_TIME_FORMAT "%Y-%m-%e %k:%M:%S %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):780
                                                                                                                                                                                          Entropy (8bit):4.716025632367214
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:4EnLB383HmSBBHZovDh4ToC4qU3WwVW3v6P3v3WwSn:4aR83Hxo14u3Ww+viv3WwS
                                                                                                                                                                                          MD5:CFDA7B6463305FA15DBBA72D725A1876
                                                                                                                                                                                          SHA1:2BF885073FBAF4A38B7AFDA76CA391F195A5A362
                                                                                                                                                                                          SHA-256:7E1C5BD9EC1A17BB851B0DCABD0DFA9FF9D64B89603D9D3FBEAAC609172346AE
                                                                                                                                                                                          SHA-512:55F974C706933ECE0575A33C381D9B370B8A408C5C5514C805EC04C8B0CA5BAFAA47267DA98E1805B478A9589FFB7549D79002B2A7AF387049011D78DD7605B6
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset zh_HK DAYS_OF_WEEK_ABBREV [list \.. "\u65e5"\.. "\u4e00"\.. "\u4e8c"\.. "\u4e09"\.. "\u56db"\.. "\u4e94"\.. "\u516d"].. ::msgcat::mcset zh_HK MONTHS_ABBREV [list \.. "1\u6708"\.. "2\u6708"\.. "3\u6708"\.. "4\u6708"\.. "5\u6708"\.. "6\u6708"\.. "7\u6708"\.. "8\u6708"\.. "9\u6708"\.. "10\u6708"\.. "11\u6708"\.. "12\u6708"\.. ""].. ::msgcat::mcset zh_HK DATE_FORMAT "%Y\u5e74%m\u6708%e\u65e5".. ::msgcat::mcset zh_HK TIME_FORMAT_12 "%P%I:%M:%S".. ::msgcat::mcset zh_HK DATE_TIME_FORMAT "%Y\u5e74%m\u6708%e\u65e5 %P%I:%M:%S %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):347
                                                                                                                                                                                          Entropy (8bit):5.062880051437783
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoOpEoPpFocMohX3v6Zwoh+3v6fxvn:4EnLB383J53v6O3vCn
                                                                                                                                                                                          MD5:3218F8E6BEDD534277DE0849C423158E
                                                                                                                                                                                          SHA1:10C006446A10406A5644C4033665E877EBF72AF7
                                                                                                                                                                                          SHA-256:500546B3211D454659D845B4AB9AEF226125100DF40407C49530DE17CDD4363F
                                                                                                                                                                                          SHA-512:3142893DA85BA8F83A5B6851B313B5F5FF80D2B989C1AE015665EE70373249B44EFB4FF7C621F1D8F37AC6019EF5E8D6D21C76C48998C3D9072F9C5060AA8813
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset zh_SG AM "\u4e0a\u5348".. ::msgcat::mcset zh_SG PM "\u4e2d\u5348".. ::msgcat::mcset zh_SG DATE_FORMAT "%d %B %Y".. ::msgcat::mcset zh_SG TIME_FORMAT_12 "%P %I:%M:%S".. ::msgcat::mcset zh_SG DATE_TIME_FORMAT "%d %B %Y %P %I:%M:%S %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):354
                                                                                                                                                                                          Entropy (8bit):5.124064818715749
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSyEtJLl73oo6d3/xoAykaRULH/XRxy/5oAyjZRULHi5oAyU/G0OMoAyxW3v6ZQ:4EnLB38315xDOiKRRW3v6F3v8A2n
                                                                                                                                                                                          MD5:9010E34791B5DDB7F1E0AD4DA6BD4623
                                                                                                                                                                                          SHA1:418F7374BABEF27FEC8E00D3A32F535084593AB9
                                                                                                                                                                                          SHA-256:DBA0584B8E1925B439F06E0BF0965E97AFB7EB39E70E0E4C9B70769EBC5F996C
                                                                                                                                                                                          SHA-512:D3AB698B725E84DAB06E472C41FF2EB55D63885D22B4598C596800BAC83A02A44CB524524F267D090952AF7E0031F47720786ACF9E354EF672CF9EEFB7DB3BD4
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/loadICU.tcl -- do not edit..namespace eval ::tcl::clock {.. ::msgcat::mcset zh_TW BCE "\u6c11\u570b\u524d".. ::msgcat::mcset zh_TW CE "\u6c11\u570b".. ::msgcat::mcset zh_TW DATE_FORMAT "%Y/%m/%e".. ::msgcat::mcset zh_TW TIME_FORMAT_12 "%P %I:%M:%S".. ::msgcat::mcset zh_TW DATE_TIME_FORMAT "%Y/%m/%e %P %I:%M:%S %z"..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:Tcl script, ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):33777
                                                                                                                                                                                          Entropy (8bit):4.60013086740989
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:4D0xrpIuhenN4kA0G6sRcl5AdtsPLKiF64aJQ2L:HpnhsS9C5Adqua5aJvL
                                                                                                                                                                                          MD5:4ECD97188BFED58A15FE22EC566FA6A3
                                                                                                                                                                                          SHA1:6E4E91096298F1A0AE6CD4241F167C8B4F661EE5
                                                                                                                                                                                          SHA-256:67A157F1873D606B53DC4D894BD8E71F6B1A0DD66177B9513BD039B348B40349
                                                                                                                                                                                          SHA-512:1D5067BBB13DAB001168EEB41EBFA2D13BACB0F43A8067CC93923E8F4D062AA387DA23D7D98D6A2AE77D7C849A6026F2343102CBE03690C2CEA0890222339475
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# optparse.tcl --..#..# (private) Option parsing package..# Primarily used internally by the safe:: code...#..#.WARNING: This code will go away in a future release..#.of Tcl. It is NOT supported and you should not rely..#.on it. If your code does rely on this package you..#.may directly incorporate this code into your application.....package require Tcl 8.5-..# When this version number changes, update the pkgIndex.tcl file..# and the install directory in the Makefiles...package provide opt 0.4.8....namespace eval ::tcl {.... # Exported APIs.. namespace export OptKeyRegister OptKeyDelete OptKeyError OptKeyParse \.. OptProc OptProcArgGiven OptParse \... Lempty Lget \.. Lassign Lvarpop Lvarpop1 Lvarset Lvarincr \.. SetMax SetMin......################# Example of use / 'user documentation' ###################.... proc OptCreateTestProc {} {.....# Defines ::tcl::OptParseTest as a test proc with parsed arguments...# (can't be d
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):620
                                                                                                                                                                                          Entropy (8bit):4.702477618616754
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:jHxIRu9zhjJS42wbGlTULuUAZb3KykszLYIGbyAkXaqrQ+pBb6:biRUJS42wbGlTUcZ+yk2LY0XaqrB4
                                                                                                                                                                                          MD5:07532085501876DCC6882567E014944C
                                                                                                                                                                                          SHA1:6BC7A122429373EB8F039B413AD81C408A96CB80
                                                                                                                                                                                          SHA-256:6A4ABD2C519A745325C26FB23BE7BBF95252D653A24806EB37FD4AA6A6479AFE
                                                                                                                                                                                          SHA-512:0D604E862F3A1A19833EAD99AAF15A9F142178029AB64C71D193CEE4901A0196C1EEDDC2BCE715B7FA958AC45C194E63C77A71E4BE4F9AEDFD5B44CF2A726E76
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Tcl package index file, version 1.1..# This file is generated by the "pkg_mkIndex -direct" command..# and sourced either when an application starts up or..# by a "package unknown" script. It invokes the..# "package ifneeded" command to set up package-related..# information so that packages will be loaded automatically..# in response to "package require" commands. When this..# script is sourced, the variable $dir must contain the..# full path name of this file's directory.....if {![package vsatisfies [package provide Tcl] 8.5-]} {return}..package ifneeded opt 0.4.8 [list source [file join $dir optparse.tcl]]..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):23995
                                                                                                                                                                                          Entropy (8bit):4.884828325514459
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:8xgjLNILEHsdAW2UfnImRqXqux6XmihmCchzPLrXJjJh6PLfzdklG:8xgjLNImsdnvIm86uGLhLchzDzJ9h6Dn
                                                                                                                                                                                          MD5:DDB0AB9842B64114138A8C83C4322027
                                                                                                                                                                                          SHA1:ECCACDC2CCD86A452B21F3CF0933FD41125DE790
                                                                                                                                                                                          SHA-256:F46AB61CDEBE3AA45FA7E61A48930D64A0D0E7E94D04D6BF244F48C36CAFE948
                                                                                                                                                                                          SHA-512:C0CF718258B4D59675C088551060B34CE2BC8638958722583AC2313DC354223BFEF793B02F1316E522A14C7BA9BED219531D505DE94DC3C417FC99D216A01463
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# package.tcl --..#..# utility procs formerly in init.tcl which can be loaded on demand..# for package management...#..# Copyright (c) 1991-1993 The Regents of the University of California...# Copyright (c) 1994-1998 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....namespace eval tcl::Pkg {}....# ::tcl::Pkg::CompareExtension --..#..# Used internally by pkg_mkIndex to compare the extension of a file to a given..# extension. On Windows, it uses a case-insensitive comparison because the..# file system can be file insensitive...#..# Arguments:..# fileName.name of a file whose extension is compared..# ext..(optional) The extension to compare against; you must..#..provide the starting dot...#..Defaults to [info sharedlibextension]..#..# Results:..# Returns 1 if the extension matches, 0 otherwise....proc tcl::Pkg::CompareExtension {fileName {ext {}}} {.. global tcl_platfor
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):844
                                                                                                                                                                                          Entropy (8bit):4.883013702569192
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:TF7S2n2wn2SNHaeYF9xcwrmXhbs1GUiSYX3EtSK78ex4VIpynEw88/McUBbPgnz:TF7Hn2wnlk2KwyZSM4SkV/3UB7Cz
                                                                                                                                                                                          MD5:577787C2F4F5956BA70F83012B980AE5
                                                                                                                                                                                          SHA1:040B2469F796F3FDFCD1E1DD2EB1C5B799EDEF62
                                                                                                                                                                                          SHA-256:E269029C8263E3CBC1920C3604ECDCF15EDCCB208A0D68F9EB42B73954D620C0
                                                                                                                                                                                          SHA-512:C2940F6F3D77412EFC537B8AB67352F519DFFA95739FCC17BF1817335AFD9E5BFE91ABE98CBA99E278CB4923D4E6D431ED9D72282745203C0F7D73193F550238
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# parray:..# Print the contents of a global array on stdout...#..# Copyright (c) 1991-1993 The Regents of the University of California...# Copyright (c) 1994 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....proc parray {a {pattern *}} {.. upvar 1 $a array.. if {![array exists array]} {...return -code error "\"$a\" isn't an array".. }.. set maxl 0.. set names [lsort [array names array $pattern]].. foreach name $names {...if {[string length $name] > $maxl} {... set maxl [string length $name]...}.. }.. set maxl [expr {$maxl + [string length $a] + 2}].. foreach name $names {...set nameString [format %s(%s) $a $name]...puts stdout [format "%-*s = %s" $maxl $nameString $array($name)].. }..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:Tcl script, ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):42223
                                                                                                                                                                                          Entropy (8bit):4.822635446297551
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:H/Jo8y7AyARYhZfc3njlVdRIp4xOtoYx4WneNiBq5vIhfwEaqadlUCJ2Pbb1P6:H/c7AmhZmnjvdRIG924WneNiBq5+fwEc
                                                                                                                                                                                          MD5:B8C1561D471CFBF4111C706411D59883
                                                                                                                                                                                          SHA1:71483EAEEF377EE9AF90BEC44F70C7B12C5BC720
                                                                                                                                                                                          SHA-256:C21DCE3AB31893118BBED01E559070F1D3541877FEE331BD45F5BF4300ED9654
                                                                                                                                                                                          SHA-512:465065A938C71AF4588B3331B51A62DD57F57492EB1CB6C0F52B9FD0A2FE7A54B1E995AA56E4A41D7A99EAFF665C1E23E3B240FB3F9840AB242C21B1DBFFFF45
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# safe.tcl --..#..# This file provide a safe loading/sourcing mechanism for safe interpreters...# It implements a virtual path mechanism to hide the real pathnames from the..# child. It runs in a parent interpreter and sets up data structure and..# aliases that will be invoked when used from a child interpreter...#..# See the safe.n man page for details...#..# Copyright (c) 1996-1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution of..# this file, and for a DISCLAIMER OF ALL WARRANTIES.....#..# The implementation is based on namespaces. These naming conventions are..# followed:..# Private procs starts with uppercase...# Public procs are exported and starts with lowercase..#....# Needed utilities package..package require opt 0.4.8....# Create the safe namespace..namespace eval ::safe {.. # Exported API:.. namespace export interpCreate interpInit interpConfigure interpDelete \...interpAddToAccessPath interpFindInAccessPath setL
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):5617
                                                                                                                                                                                          Entropy (8bit):4.747404679682368
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:eOaVhNUMUuUQU2UsUIUbUEUEeUkgU6UWSO0DT5RTdcvsilrvs+jscMK57ehXowrz:ejVHRRLP3LWDXewTbSO0DT5RTdcvsilg
                                                                                                                                                                                          MD5:C62FB22F4C9A3EFF286C18421397AAF4
                                                                                                                                                                                          SHA1:4A49B8768CFF68F2EFFAF21264343B7C632A51B2
                                                                                                                                                                                          SHA-256:DDF7E42DEF37888AD0A564AA4F8CA95F4EEC942CEBEBFCA851D35515104D5C89
                                                                                                                                                                                          SHA-512:558D401CB6AF8CE3641AF55CAEBC9C5005AB843EE84F60C6D55AFBBC7F7129DA9C58C2F55C887C3159107546FA6BC13FFC4CCA63EA8841D7160B8AA99161A185
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Tcl autoload index file, version 2.0..# -*- tcl -*-..# This file is generated by the "auto_mkindex" command..# and sourced to set up indexing information for one or..# more commands. Typically each line is a command that..# sets an element in the auto_index array, where the..# element name is the name of a command and the value is..# a script that loads the command.....set auto_index(auto_reset) [list source [file join $dir auto.tcl]]..set auto_index(tcl_findLibrary) [list source [file join $dir auto.tcl]]..set auto_index(auto_mkindex) [list source [file join $dir auto.tcl]]..set auto_index(auto_mkindex_old) [list source [file join $dir auto.tcl]]..set auto_index(::auto_mkindex_parser::init) [list source [file join $dir auto.tcl]]..set auto_index(::auto_mkindex_parser::cleanup) [list source [file join $dir auto.tcl]]..set auto_index(::auto_mkindex_parser::mkindex) [list source [file join $dir auto.tcl]]..set auto_index(::auto_mkindex_parser::hook) [list source [file join $dir auto.t
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):12204
                                                                                                                                                                                          Entropy (8bit):4.763796758810551
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:55CjnlRfMKqaOH5bE2KjNkkpgpCmqkkuowUh9PTYMsvSO+xy8h/vuKisM68E:5q3MKYH5bE1jNkkpgomq/uCPTYMC+k83
                                                                                                                                                                                          MD5:215262A286E7F0A14F22DB1AA7875F05
                                                                                                                                                                                          SHA1:66B942BA6D3120EF8D5840FCDEB06242A47491FF
                                                                                                                                                                                          SHA-256:4B7ED9FD2363D6876092DB3F720CBDDF97E72B86B519403539BA96E1C815ED8F
                                                                                                                                                                                          SHA-512:6ECD745D7DA9D826240C0AB59023C703C94B158AE48C1410FAA961A8EDB512976A4F15AE8DEF099B58719ADF0D2A9C37E6F29F54D39C1AB7EE81FA333A60F39B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# -*- tcl -*-..#..# Searching for Tcl Modules. Defines a procedure, declares it as the primary..# command for finding packages, however also uses the former 'package unknown'..# command as a fallback...#..# Locates all possible packages in a directory via a less restricted glob. The..# targeted directory is derived from the name of the requested package, i.e...# the TM scan will look only at directories which can contain the requested..# package. It will register all packages it found in the directory so that..# future requests have a higher chance of being fulfilled by the ifneeded..# database without having to come to us again...#..# We do not remember where we have been and simply rescan targeted directories..# when invoked again. The reasoning is this:..#..# - The only way we get back to the same directory is if someone is trying to..# [package require] something that wasn't there on the first scan...#..# Either..# 1) It is there now: If we rescan, you get it; if not you don
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):147
                                                                                                                                                                                          Entropy (8bit):4.995501022397479
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/2DcsBdNMXGm2OHnFvpsYoHsdSalHFLwy:SlSWB9eg/2DBpDm2OHnFvmYoH1alHOy
                                                                                                                                                                                          MD5:FF8B5540631A6EE93507338C4E7AA49D
                                                                                                                                                                                          SHA1:817B261A1B6B92AA498EC286349964EA10FB5A84
                                                                                                                                                                                          SHA-256:7213997BB9CF9D384A7002B8C8EFEF25C01ABA6083D9835A16D583D5DCEE40A0
                                                                                                                                                                                          SHA-512:8D78AC4868ED0013EDA536C0E82E0E91398772AA18C637AEFE22F24B142FCDA55A4CB853B2282951E907C9E2F62BD3F831A5CF995F52898F5225D16889943A9C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Abidjan) {.. {-9223372036854775808 -968 0 LMT}.. {-1830383032 0 0 GMT}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):183
                                                                                                                                                                                          Entropy (8bit):4.832432925672155
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2Dc9XfBQDcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2DUGDBS
                                                                                                                                                                                          MD5:52FDFD3DB98475FBBB620D0D5565C5CC
                                                                                                                                                                                          SHA1:C7750452859663605272553DBEE0B6C134E1517C
                                                                                                                                                                                          SHA-256:6040827AFED8CEF45F252FBD7E3E862C0B5E9D06C1C98C58BAD61DFE67BD57CC
                                                                                                                                                                                          SHA-512:2FF9D96D81279148A86BE208FEEACCBCB8B4224D093D6C092ECD1C4EA2186589CCF947027D3A726600C703611B4CFEE029AA14ED3E8593C477B427C4F342CF27
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Accra) $TZData(:Africa/Abidjan)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):189
                                                                                                                                                                                          Entropy (8bit):4.817170256300069
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/2DczqIVDcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/2DnaDkO
                                                                                                                                                                                          MD5:30CDD4D37E9DD60FBF6D754C9343F364
                                                                                                                                                                                          SHA1:56F896C21068764B7B8F884F374B18913CA3D9CA
                                                                                                                                                                                          SHA-256:E11FD8AD8572B684333810CFDC23B92E1ACF619875866985E288D92F8277D07F
                                                                                                                                                                                          SHA-512:78FC8043CCE25713404E70996229E5EA8238BF5C0F59029064EDA5494E2D4F54398931F3D855E30C82B2C53B789C40EE4CBF09D0F98C2BA6734595D4AA75017A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Africa/Addis_Ababa) $TZData(:Africa/Nairobi)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1080
                                                                                                                                                                                          Entropy (8bit):4.187497782275587
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB862D7nmdHh5Cv6/lHY8SOSuvvzXipFSgSO5vW5aKmvbsF6VWsXN87QBWcAFy:5veSvKlHYXNujXipFSjKRKXiWsXCGWJy
                                                                                                                                                                                          MD5:E8D3DF11CE0E7575485573FA07D955D5
                                                                                                                                                                                          SHA1:3B2C00C85B6C0BFAA1C676C970D6DF1B4BDC3D4A
                                                                                                                                                                                          SHA-256:E6874647561CE1C5FD1F650C9B167F77AC5B24FD2026046399A9043CF998E5C4
                                                                                                                                                                                          SHA-512:E2968BE847622CF243C0E498436FD21BDC2E1DF0FD8D694F2C70569D17CE896CDE4968BB8ABDEF9F687439E4EA2D955AE87D6C15E81F881EE1413416A90765D4
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Algiers) {.. {-9223372036854775808 732 0 LMT}.. {-2486592732 561 0 PMT}.. {-1855958961 0 0 WET}.. {-1689814800 3600 1 WEST}.. {-1680397200 0 0 WET}.. {-1665363600 3600 1 WEST}.. {-1648342800 0 0 WET}.. {-1635123600 3600 1 WEST}.. {-1616893200 0 0 WET}.. {-1604278800 3600 1 WEST}.. {-1585443600 0 0 WET}.. {-1574038800 3600 1 WEST}.. {-1552266000 0 0 WET}.. {-1539997200 3600 1 WEST}.. {-1531443600 0 0 WET}.. {-956365200 3600 1 WEST}.. {-950486400 0 0 WET}.. {-942012000 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796262400 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-766630800 3600 0 CET}.. {-733280400 0 0 WET}.. {-439430400 3600 0 CET}.. {-212029200 0 0 WET}.. {41468400 3600 1 WEST}.. {54774000 0 0 WET}.. {231724800 3600 1 WEST}.. {246240000 3600 0 CET}.. {259545600 7200 1 CEST}.. {275274000 3600 0 CET}.. {309740400 0 0 WET}.. {
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):184
                                                                                                                                                                                          Entropy (8bit):4.801054282631739
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/2DcjEUEH+DcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/2DGs+DR
                                                                                                                                                                                          MD5:A543BDEB3771017421FB75231F0004F2
                                                                                                                                                                                          SHA1:D682C58C27562FF3ABAB8EDE8EB6EA754DA7C02E
                                                                                                                                                                                          SHA-256:064EB7F9A1FA05A317C6BDCA6B102BC1560D980758F9E4DDB010C9E7DC068ECB
                                                                                                                                                                                          SHA-512:44848D60EDC79AF784A819714C0D9F62DCCB6329B47F25D74AB8C174BF9EC3F783C66FEB27F588A93FABA9BECAF076F453D6D797CE4F28461F7AE69440EA54C7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Africa/Asmara) $TZData(:Africa/Nairobi)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):184
                                                                                                                                                                                          Entropy (8bit):4.806258322241929
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/2DcjAWDcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/2D8DkOn
                                                                                                                                                                                          MD5:1B5E386E7A2F10D9385DE4C5683EBB85
                                                                                                                                                                                          SHA1:FECBA599C37493D2E0AEE8E21BAB40BF8E8DC82A
                                                                                                                                                                                          SHA-256:76939852A98EA7BF156D0AC18B434CC610DAF5232322C0FBB066CD52C5B72AF7
                                                                                                                                                                                          SHA-512:B36FABFCDB2187A3A4A211C8E033D96C91E3C4D47907D284E10786555562C82231566033EAB4753EF1E48DF1233CFC8C6C0FB3CA50748BE0B2554A972A88FBA0
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Africa/Asmera) $TZData(:Africa/Nairobi)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):184
                                                                                                                                                                                          Entropy (8bit):4.883634030944169
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2DcxAQDcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2DwNDBS
                                                                                                                                                                                          MD5:6B9BB5B37C41AA727E31BF03483DC1CA
                                                                                                                                                                                          SHA1:CB3BBA37B063EA4A54CD15C6E30C14D8CA30D3C0
                                                                                                                                                                                          SHA-256:F6D1BA22115A6565B6D6ABEB578F001DDB41E673C422C8EA70D0DF77B24115F6
                                                                                                                                                                                          SHA-512:23DB3E298FDEB165FD85D99E03C00835B584984B814AF7F54A9CDD4A9F93E16B0C58342D319129F46CF8EC36F93DE5EA51B492CA4CABDAB75D84709BC6C26119
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Bamako) $TZData(:Africa/Abidjan)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):178
                                                                                                                                                                                          Entropy (8bit):4.882974805254803
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2Dcx2m/2DcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2Dw/2D4yn
                                                                                                                                                                                          MD5:92FF9E5835C0C80F358BFE69120660A0
                                                                                                                                                                                          SHA1:724758B43BD79DD8A29B02BE6910D492924F8280
                                                                                                                                                                                          SHA-256:5047A507D22B68C9349EB6A48C41C80DB4C69F98F99C6574059DEA87178E36C0
                                                                                                                                                                                          SHA-512:6FCB709DB4AC19191FECE1E8BAC55E77F265B5AF89F7A3565F06BFAF0BEE12E3EAF2F52CA09C68D75C358C25A31867505CE8AD75D7386DCD15F4BE1CE61272CD
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Bangui) $TZData(:Africa/Lagos)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):184
                                                                                                                                                                                          Entropy (8bit):4.888193386512119
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2Dcx79FHp4DcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2Dw7J4c
                                                                                                                                                                                          MD5:46E5703CF284E44E15E5872DF075FCBC
                                                                                                                                                                                          SHA1:EA4BFA6D568DFA877F72302ADA21ECC2840D9FD5
                                                                                                                                                                                          SHA-256:77E610A02CCECE3045B09D07A9BE6100F5AA9C3C2AEB543535C9AE941194F4E4
                                                                                                                                                                                          SHA-512:1454467FE63E97DFA4DE66E359F68B2D80C92CDE59FC15A4BE513629FFD154D2281EADF3FC78F7AFDDF5A5896195F3A69E66697A659BBB1A0EAFD3E1DA6565EC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Banjul) $TZData(:Africa/Abidjan)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):176
                                                                                                                                                                                          Entropy (8bit):4.847843768169462
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/2Dc5iDMXGm2OHGVkeoHsdSawwF6hSVPVFwy:SlSWB9eg/2D4uDm2OHCkeoH1awwFMmMy
                                                                                                                                                                                          MD5:7E710C939B9CC0C1AC1ECF4239B543C5
                                                                                                                                                                                          SHA1:429CC87086FB22727815ED05AC6472333FF06013
                                                                                                                                                                                          SHA-256:2A870E534DE67713C27F2F3B9BF26FA7498C240CF633988CE76DBDAC5B69214D
                                                                                                                                                                                          SHA-512:70D9365C31C43A95211FC20E9290B24D356FFEFA935B8829CE32831026A196DECDD12226097F6DA3B4B919E137AA0181714680CDBB72B00C130A87E3A4735004
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Bissau) {.. {-9223372036854775808 -3740 0 LMT}.. {-1830380400 -3600 0 -01}.. {157770000 0 0 GMT}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):183
                                                                                                                                                                                          Entropy (8bit):4.904342145830274
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsfKG5XHAIgNGEjKORL/2Dc8ycXp75h4DcfKB:SlSWB9vsM3y7fnHAIgNTjdN/2DAmp1hs
                                                                                                                                                                                          MD5:7AD3749D7047855CB9B9EC9696015402
                                                                                                                                                                                          SHA1:F792359AD9EEC2ABD98DAFA6661C1E57BAB89EBE
                                                                                                                                                                                          SHA-256:8F700409B8EEE33ACE5F050414971FFEE0270949842E58E9299BB5CD6CCF34DE
                                                                                                                                                                                          SHA-512:681C1B318746C587DEBA6E109D1D5A99D1F3E28FE46C24F36B69D533D884FDDC6EA35BB31A475575D683B73BF129FED761523EC9285F2FF1E4CACA2C54C046C5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Maputo)]} {.. LoadTimeZoneFile Africa/Maputo..}..set TZData(:Africa/Blantyre) $TZData(:Africa/Maputo)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):183
                                                                                                                                                                                          Entropy (8bit):4.901235831565769
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2DciE0TMJZp4DcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2D4qGp4D1
                                                                                                                                                                                          MD5:7028268EE88250AC40547A3FDBBFC67C
                                                                                                                                                                                          SHA1:5006D499CD1D1CB93EB3DA0EC279F76B7123DAA6
                                                                                                                                                                                          SHA-256:596DB2D64CDD6250642CB65514D5BCB52F3E3EA83F50D8915D9D4FDEA008F440
                                                                                                                                                                                          SHA-512:D623C69FE8A6050E77FB819C2F5FAEE35D5034182B1D30A409C17208155501656133E774E402875537335F8201E4734A0B5D327712CBF623AC330F1014D9025B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Brazzaville) $TZData(:Africa/Lagos)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):184
                                                                                                                                                                                          Entropy (8bit):4.947752840781864
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsfKG5XHAIgNGEjKORL/2DclbDcfKB:SlSWB9vsM3y7fnHAIgNTjdN/2DkbDEi
                                                                                                                                                                                          MD5:0EBC2D8F0BD1A32C21070F9397EAC9E2
                                                                                                                                                                                          SHA1:95AAA97427265635784E8AC624CA863DB9F1475D
                                                                                                                                                                                          SHA-256:9A15867255B43A954CA60DA11660F157553AAB6A15C50ACD49D182276E0CF4CC
                                                                                                                                                                                          SHA-512:4CD2E14F84C58E955742637A51D99DB9493972671A2B5D801EBD9D901D4903654E374C59BF010C70071D33FA17788358F78004201A787CCA2AD714D670393488
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Maputo)]} {.. LoadTimeZoneFile Africa/Maputo..}..set TZData(:Africa/Bujumbura) $TZData(:Africa/Maputo)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):3852
                                                                                                                                                                                          Entropy (8bit):3.7766651198444507
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:58ybRwEa40MF4pt0/jaGYbaJF0a3T07ITB85oWXmSGmuyTVuV0apRQnL0KD3rZza:fLg1GbJFp3gHRQVy7DPUUQkiHMo
                                                                                                                                                                                          MD5:9DCDB3DD41DA13D81EB8E1CAF56964DA
                                                                                                                                                                                          SHA1:F95EE7B1EF464F2640EC4AE29F3C18B5BF2B2905
                                                                                                                                                                                          SHA-256:8698B0A53D858AEA7C495EDF759EF0E6C63F7E07A256599393DEC7B7A7413734
                                                                                                                                                                                          SHA-512:BA5898ABEE541BC72C9DEDD77BABB18024C7AEA0274FA3F809748FCBFF770BFAD902BF70680DDE989F7D3592E5398C100D0E0EA388D4200911ED7DE089535D6D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Cairo) {.. {-9223372036854775808 7509 0 LMT}.. {-2185409109 7200 0 EET}.. {-929844000 10800 1 EEST}.. {-923108400 7200 0 EET}.. {-906170400 10800 1 EEST}.. {-892868400 7200 0 EET}.. {-875844000 10800 1 EEST}.. {-857790000 7200 0 EET}.. {-844308000 10800 1 EEST}.. {-825822000 7200 0 EET}.. {-812685600 10800 1 EEST}.. {-794199600 7200 0 EET}.. {-779853600 10800 1 EEST}.. {-762663600 7200 0 EET}.. {-399088800 10800 1 EEST}.. {-386650800 7200 0 EET}.. {-368330400 10800 1 EEST}.. {-355114800 7200 0 EET}.. {-336790800 10800 1 EEST}.. {-323654400 7200 0 EET}.. {-305168400 10800 1 EEST}.. {-292032000 7200 0 EET}.. {-273632400 10800 1 EEST}.. {-260496000 7200 0 EET}.. {-242096400 10800 1 EEST}.. {-228960000 7200 0 EET}.. {-210560400 10800 1 EEST}.. {-197424000 7200 0 EET}.. {-178938000 10800 1 EEST}.. {-165801600 7200 0 EET}.. {-147402000
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):5532
                                                                                                                                                                                          Entropy (8bit):3.535398586134154
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:zE+CJZtmaG6/eszBrlxs5MRhk9xPmwv7KbGKCDp0d:7MZSszBrlKcJC9k
                                                                                                                                                                                          MD5:18183122D242E0B69A80BC02BC0328DF
                                                                                                                                                                                          SHA1:C9976ABC0663EB29A2FEAAFDF6746C05A264B67C
                                                                                                                                                                                          SHA-256:8776EEDFDFEE09C4C833593127CEFAC9C33E2487AB9BF4BF8C73E5E11B4E5613
                                                                                                                                                                                          SHA-512:9611A6EF9C5B55FAB752C1EC7E464B8AF60AE32383CE9BA72F35168ABB68A45DB0654A9099CBDC123F5F6E2B6DB7C8FBF56A8DDB813824187AD1090971F12219
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Casablanca) {.. {-9223372036854775808 -1820 0 LMT}.. {-1773012580 0 0 +00}.. {-956361600 3600 1 +00}.. {-950490000 0 0 +00}.. {-942019200 3600 1 +00}.. {-761187600 0 0 +00}.. {-617241600 3600 1 +00}.. {-605149200 0 0 +00}.. {-81432000 3600 1 +00}.. {-71110800 0 0 +00}.. {141264000 3600 1 +00}.. {147222000 0 0 +00}.. {199756800 3600 1 +00}.. {207702000 0 0 +00}.. {231292800 3600 1 +00}.. {244249200 0 0 +00}.. {265507200 3600 1 +00}.. {271033200 0 0 +00}.. {448243200 3600 0 +01}.. {504918000 0 0 +00}.. {1212278400 3600 1 +00}.. {1220223600 0 0 +00}.. {1243814400 3600 1 +00}.. {1250809200 0 0 +00}.. {1272758400 3600 1 +00}.. {1281222000 0 0 +00}.. {1301788800 3600 1 +00}.. {1312066800 0 0 +00}.. {1335664800 3600 1 +00}.. {1342749600 0 0 +00}.. {1345428000 3600 1 +00}.. {1348970400 0 0 +00}.. {1367114400 3600 1 +00}.. {13731
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7536
                                                                                                                                                                                          Entropy (8bit):3.8315604186920704
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:TzLdXKy9f4elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxo:TdayR41sFpM5vwA6Efv03TBZLl
                                                                                                                                                                                          MD5:30155093248C4F7E45EF7C0132D2B2AB
                                                                                                                                                                                          SHA1:FAD100CC49F0CB0910BDE39B43295A47512E1BE6
                                                                                                                                                                                          SHA-256:8827F7311EDE69A9679BDF2B7418DBF350A2FC8F973E8B1E1E4390D4D5C6D2E8
                                                                                                                                                                                          SHA-512:469A24AF0C2A4A40CB2488C3E21BB9BBDE057F876EACA08A31FC6F22845063D917A0A4AE96680401E45792DE534EE3A305F137A93C4DF879B4602510D881270E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Ceuta) {.. {-9223372036854775808 -1276 0 LMT}.. {-2177452800 0 0 WET}.. {-1630112400 3600 1 WEST}.. {-1616810400 0 0 WET}.. {-1451692800 0 0 WET}.. {-1442451600 3600 1 WEST}.. {-1427673600 0 0 WET}.. {-1379293200 3600 1 WEST}.. {-1364774400 0 0 WET}.. {-1348448400 3600 1 WEST}.. {-1333324800 0 0 WET}.. {-1316390400 3600 1 WEST}.. {-1301270400 0 0 WET}.. {-1293840000 0 0 WET}.. {-94694400 0 0 WET}.. {-81432000 3600 1 WEST}.. {-71110800 0 0 WET}.. {141264000 3600 1 WEST}.. {147222000 0 0 WET}.. {199756800 3600 1 WEST}.. {207702000 0 0 WET}.. {231292800 3600 1 WEST}.. {244249200 0 0 WET}.. {265507200 3600 1 WEST}.. {271033200 0 0 WET}.. {448243200 3600 0 CET}.. {504918000 3600 0 CET}.. {512528400 7200 1 CEST}.. {528253200 3600 0 CET}.. {543978000 7200 1 CEST}.. {559702800 3600 0 CET}.. {575427600 7200 1 CEST}.. {591152400 3600
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):185
                                                                                                                                                                                          Entropy (8bit):4.88110192592456
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2DcmMM1+DcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2DCM1+c
                                                                                                                                                                                          MD5:8CDD2EEB7E0EC816F3EC051350FEBF13
                                                                                                                                                                                          SHA1:37F3A149B4A01DFA2EAB42A28C810BE66AAB7C52
                                                                                                                                                                                          SHA-256:3176C99FC45337CBCE0CD516DE4B02B8BAA47D00E84F698122A2ADD57797984E
                                                                                                                                                                                          SHA-512:5A90B6DB45EDAD7734D596FB81FD1959A433F57E71D2212E1DCBD6A12F3FD1FE747FA363C4C787A4D3023F542553C1E2C9CF4F61E28F1BB13042E4AFE3D0FF31
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Conakry) $TZData(:Africa/Abidjan)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):183
                                                                                                                                                                                          Entropy (8bit):4.856992353568779
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2DcXXMFBx/2DcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2DKXEBn
                                                                                                                                                                                          MD5:946D3B52F915445DBB8EE8BF67F4EFAB
                                                                                                                                                                                          SHA1:18345968B95E886CA72634D49F2B38F9B29BA629
                                                                                                                                                                                          SHA-256:D50F9732757B284BAC75526F2CFA585DF7F6974160827AFB0FF66124C7CFD361
                                                                                                                                                                                          SHA-512:00B531D1352CF35045EE25C777C7FEA17294E9861E68CE2DE0D9884C05EBDEA84D5F4F0E8B5605721295E25C259979446B7DB76525A633C7D2FA35B38962CF43
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Dakar) $TZData(:Africa/Abidjan)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):191
                                                                                                                                                                                          Entropy (8bit):4.8447607449193075
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/2Dc8bEH+DcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/2DJbVDR
                                                                                                                                                                                          MD5:7A819572758BC60F4085DF28F1DD1C01
                                                                                                                                                                                          SHA1:0A5BA34EBFBA5A8E8B896713BA527781FC90FF01
                                                                                                                                                                                          SHA-256:AB69948637416219A3D458777990FA4568BEBC89388884BBF129C0E1370A560B
                                                                                                                                                                                          SHA-512:C03E785D1E85292056BB0BDD8DF8326C5DFEB6070AB1C071E1032D14EA69C9DEBC57B2CC7852E35D31652187126CCF0009A6A5C32F9DBB75D56C705535DF05CC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Africa/Dar_es_Salaam) $TZData(:Africa/Nairobi)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):186
                                                                                                                                                                                          Entropy (8bit):4.829357904445218
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/2DcRHKQ1BQDcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/2DOrkDR
                                                                                                                                                                                          MD5:7981499F9430DC1636C9F834273E0B91
                                                                                                                                                                                          SHA1:1D63F8578420D56E4A5D9D0881FBEC015421E416
                                                                                                                                                                                          SHA-256:E7F7560CCD65D53C446ADAE7128A74D37E17DD0B907A2F2FD85322FB8707B497
                                                                                                                                                                                          SHA-512:3C3F7D78E9A0DE6E2950E1C305EA2DBC986754AE9FB10AC410685F30C39EC235F6F221393099C012E62EE5A7B4F1BED67C96B7B81E90BBA064BA9FE685FE4050
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Africa/Djibouti) $TZData(:Africa/Nairobi)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):178
                                                                                                                                                                                          Entropy (8bit):4.850101792457859
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2DcnKe2DcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2Dml2D4yn
                                                                                                                                                                                          MD5:44881E75AC32FA95FF6143066EF01B90
                                                                                                                                                                                          SHA1:A221619B4CDE8BE6A181E1F3869EAB665F2E98B8
                                                                                                                                                                                          SHA-256:FCF2DAD148F4D2951320EA99730C56D5EB43D505F37416BE4BAD265CE2902706
                                                                                                                                                                                          SHA-512:4FA67A5F84758366189F0FC4A7FA6C820BA083E1C56EA95D25D21A367F25F76261B7EB5631DFFEB20E095CFD64E770338773F76BD50D4CF6AE29AD3EDFCEC408
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Douala) $TZData(:Africa/Lagos)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):5235
                                                                                                                                                                                          Entropy (8bit):3.541189246992611
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:+eCJZtmaG6/eszBrlxs5MRhk9xPmwv7KbGKCDp0d:+eqZSszBrlKcJC9k
                                                                                                                                                                                          MD5:956F5B51FA8BA2E954A0E59AAC8F3276
                                                                                                                                                                                          SHA1:AE35A8502E57EA6EE173E3B42509E4CAC73DA091
                                                                                                                                                                                          SHA-256:5FB102A95B3C004AAB8371840B1A04AC352F48FF9E9EAFDEAAF21960B0F3CAA6
                                                                                                                                                                                          SHA-512:19E7F2574E2B62DF68CC24737F6B94864B3D64B2472BC7D78E6AB5142A1DC1AB3B3700AB802129CB16AED4A4FED29E2B8A5593EE327ADF496255FE2FEF6A7023
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/El_Aaiun) {.. {-9223372036854775808 -3168 0 LMT}.. {-1136070432 -3600 0 -01}.. {198291600 0 0 +00}.. {199756800 3600 1 +00}.. {207702000 0 0 +00}.. {231292800 3600 1 +00}.. {244249200 0 0 +00}.. {265507200 3600 1 +00}.. {271033200 0 0 +00}.. {1212278400 3600 1 +00}.. {1220223600 0 0 +00}.. {1243814400 3600 1 +00}.. {1250809200 0 0 +00}.. {1272758400 3600 1 +00}.. {1281222000 0 0 +00}.. {1301788800 3600 1 +00}.. {1312066800 0 0 +00}.. {1335664800 3600 1 +00}.. {1342749600 0 0 +00}.. {1345428000 3600 1 +00}.. {1348970400 0 0 +00}.. {1367114400 3600 1 +00}.. {1373162400 0 0 +00}.. {1376100000 3600 1 +00}.. {1382839200 0 0 +00}.. {1396144800 3600 1 +00}.. {1403920800 0 0 +00}.. {1406944800 3600 1 +00}.. {1414288800 0 0 +00}.. {1427594400 3600 1 +00}.. {1434247200 0 0 +00}.. {1437271200 3600 1 +00}.. {1445738400 0 0 +00}.. {1
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):186
                                                                                                                                                                                          Entropy (8bit):4.866631090752554
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2Dcu5sp4DcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2Dk4DBS
                                                                                                                                                                                          MD5:6C115220CF951FC2EE3C299F86935B6D
                                                                                                                                                                                          SHA1:A1CAB8C710BF20553AF45343118C1726CFE922B7
                                                                                                                                                                                          SHA-256:BC53A4D489F48F14C594C4B0E52079B34E043A5751BBC7DF254A560352243575
                                                                                                                                                                                          SHA-512:E87A4FD145B645DF034182CAD7F9D2BE5B2D9F3A17B6A9B6C84A0B3E846D92EC4C69DF2E85129B7A1AFBC0CCAAC8E3B1D47EB09F0900A82B908E9F6BF63B9736
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Freetown) $TZData(:Africa/Abidjan)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):183
                                                                                                                                                                                          Entropy (8bit):4.899477454245453
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsfKG5XHAIgNGEjKORL/2DcHK0o/4DcfKB:SlSWB9vsM3y7fnHAIgNTjdN/2DAV+4Dt
                                                                                                                                                                                          MD5:07222D8ED83CDC456B4D5D84C4BDE320
                                                                                                                                                                                          SHA1:2C657F461FA3F48D56C791AFE4AB7D2EAF45AF60
                                                                                                                                                                                          SHA-256:653AF88955C4418D973E2F8681A99552EB7BE95BCA64C736072F488462F7B373
                                                                                                                                                                                          SHA-512:3016D0636F401BD88BCD460F6A61782E7E8A2C32CE4ECB904C711DF414038A5818F0CA3D7FC671C5ABCE70647FC674A2EF9081C5289EBFD184B44885902E007A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Maputo)]} {.. LoadTimeZoneFile Africa/Maputo..}..set TZData(:Africa/Gaborone) $TZData(:Africa/Maputo)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):181
                                                                                                                                                                                          Entropy (8bit):4.884642061266759
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsfKG5XHAIgNGEjKORL/2Dc0B5h4DcfKB:SlSWB9vsM3y7fnHAIgNTjdN/2Dlfh4Dt
                                                                                                                                                                                          MD5:8666DABE8D196ACD94A9691C592FAF4E
                                                                                                                                                                                          SHA1:9F7EE009DCEAACA79C6EAA6FC73015D595467919
                                                                                                                                                                                          SHA-256:06B82C524585192E0E8FC69DCC1CF86183A8C5EF404645DC413FCF3F8C16B0AB
                                                                                                                                                                                          SHA-512:AAA32FD1B01BFECDD0D1C9C1DF1163374DAFE094C75720EA4095C34F7EAE7DCB594D1A7F6A2A90FB43FF01020F7AEB48E92496E0EE2D039AF23076CD369DD2A7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Maputo)]} {.. LoadTimeZoneFile Africa/Maputo..}..set TZData(:Africa/Harare) $TZData(:Africa/Maputo)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):309
                                                                                                                                                                                          Entropy (8bit):4.695542624694403
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2DWbzDm2OHePoHvmmXsd//HF2d7d6VcF2d6KsYov:MB862DW7mdHePCvmmcZvF0cVcF/KsFv
                                                                                                                                                                                          MD5:F0E153FC9B978E30742ABC025CA45E02
                                                                                                                                                                                          SHA1:73D96F3188190DAC2453E6F18A1C683CECB9CDE3
                                                                                                                                                                                          SHA-256:5EEF6475E1312051037FCAE3354E32DC0910BE7A5116B71F8CCBE1CCA08D3F1C
                                                                                                                                                                                          SHA-512:E66F4B5FF18BAAD53AFB1ED36A0827115C793075A61F794F26F32BC9F6799DF816A1F817BEB0C0BC938F89E6F5BFBE1AB4F504F1AF518764103FB287746552C7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Johannesburg) {.. {-9223372036854775808 6720 0 LMT}.. {-2458173120 5400 0 SAST}.. {-2109288600 7200 0 SAST}.. {-860976000 10800 1 SAST}.. {-845254800 7200 0 SAST}.. {-829526400 10800 1 SAST}.. {-813805200 7200 0 SAST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1127
                                                                                                                                                                                          Entropy (8bit):4.027824722230131
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5mesdOkMV0GbMSHMzNy8MXLwM0JXMfCsMzaMq0QM3W50dM44R8M1XMreM7p0z8M5:5YMV04MSHMzNxMbwM0JXMfCsMzaMq0QJ
                                                                                                                                                                                          MD5:32EC0589260D9D4BCC85FE91E6F04D00
                                                                                                                                                                                          SHA1:BAA269852C4AC6B89EA7941E7A75A007E0CF9EDF
                                                                                                                                                                                          SHA-256:F2646E15488ABF2E960759CEFE5705416E71DA71BB8407B26196244FD1A3394F
                                                                                                                                                                                          SHA-512:4F485453BE1D186ADBE0908852475C63C57BA498091C222EFFB9A5FEA2DB7F55E1BB2DBDBF6AC0F24CC67D47549FA3F5257655B5449B1BCF1FB5CDB27B03D501
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Juba) {.. {-9223372036854775808 7588 0 LMT}.. {-1230775588 7200 0 CAT}.. {10360800 10800 1 CAST}.. {24786000 7200 0 CAT}.. {41810400 10800 1 CAST}.. {56322000 7200 0 CAT}.. {73432800 10800 1 CAST}.. {87944400 7200 0 CAT}.. {104882400 10800 1 CAST}.. {119480400 7200 0 CAT}.. {136332000 10800 1 CAST}.. {151016400 7200 0 CAT}.. {167781600 10800 1 CAST}.. {182552400 7200 0 CAT}.. {199231200 10800 1 CAST}.. {214174800 7200 0 CAT}.. {230680800 10800 1 CAST}.. {245710800 7200 0 CAT}.. {262735200 10800 1 CAST}.. {277246800 7200 0 CAT}.. {294184800 10800 1 CAST}.. {308782800 7200 0 CAT}.. {325634400 10800 1 CAST}.. {340405200 7200 0 CAT}.. {357084000 10800 1 CAST}.. {371941200 7200 0 CAT}.. {388533600 10800 1 CAST}.. {403477200 7200 0 CAT}.. {419983200 10800 1 CAST}.. {435013200 7200 0 CAT}.. {452037600 10800 1 CAST}.. {466635600 7200
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):185
                                                                                                                                                                                          Entropy (8bit):4.837466713772859
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/2DcJEl2DcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/2DIEl2V
                                                                                                                                                                                          MD5:E929ED1BC316C71AABE7E625BD562FB1
                                                                                                                                                                                          SHA1:C20C172518C02D93327F4BBBC5D410BFFEF5039D
                                                                                                                                                                                          SHA-256:8EA3028CE2B025F0C457DC8F7601279CA5AF565A88B9FE80208F9F1030F2B0D0
                                                                                                                                                                                          SHA-512:B2FBCF06EACCF18DE97AF1D6BC57D9638E0A36DBF17044FF97F6B9E5089CF9E13E1304F304495324C0ACC1128A7D2D494E7C1FDB95DB0855FCE54F7028096C50
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Africa/Kampala) $TZData(:Africa/Nairobi)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1131
                                                                                                                                                                                          Entropy (8bit):4.0421745451318385
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5xe9dSXMV0GbMSHMzNy8MXLwM0JXMfCsMzaMq0QM3W50dM44R8M1XMreM7p0z8MM:5hMV04MSHMzNxMbwM0JXMfCsMzaMq0Qc
                                                                                                                                                                                          MD5:2BD3850DDBE2F05BF6F24F3AEFF7516C
                                                                                                                                                                                          SHA1:22B0DBB54E071F30D51A8654CF103F99537F74CD
                                                                                                                                                                                          SHA-256:F475DB8A857A46B310B12C21D6A9BC6CA9FF2960DA429A9D57FA375F9439E13B
                                                                                                                                                                                          SHA-512:1CF82FC07348C697F26625673DA7E3D734358B3FBE69D8E2132CAC0D9F00C7E8CDC353676CD9BAC4CBB9E26CF6638CEAE41DF559E7445D9C453409D7115FFC6C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Khartoum) {.. {-9223372036854775808 7808 0 LMT}.. {-1230775808 7200 0 CAT}.. {10360800 10800 1 CAST}.. {24786000 7200 0 CAT}.. {41810400 10800 1 CAST}.. {56322000 7200 0 CAT}.. {73432800 10800 1 CAST}.. {87944400 7200 0 CAT}.. {104882400 10800 1 CAST}.. {119480400 7200 0 CAT}.. {136332000 10800 1 CAST}.. {151016400 7200 0 CAT}.. {167781600 10800 1 CAST}.. {182552400 7200 0 CAT}.. {199231200 10800 1 CAST}.. {214174800 7200 0 CAT}.. {230680800 10800 1 CAST}.. {245710800 7200 0 CAT}.. {262735200 10800 1 CAST}.. {277246800 7200 0 CAT}.. {294184800 10800 1 CAST}.. {308782800 7200 0 CAT}.. {325634400 10800 1 CAST}.. {340405200 7200 0 CAT}.. {357084000 10800 1 CAST}.. {371941200 7200 0 CAT}.. {388533600 10800 1 CAST}.. {403477200 7200 0 CAT}.. {419983200 10800 1 CAST}.. {435013200 7200 0 CAT}.. {452037600 10800 1 CAST}.. {466635600 7
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):181
                                                                                                                                                                                          Entropy (8bit):4.910322325134086
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsfKG5XHAIgNGEjKORL/2DcCJRx+DcfKB:SlSWB9vsM3y7fnHAIgNTjdN/2DRX+DEi
                                                                                                                                                                                          MD5:3017253E1C6ACCA8D470A014E4BB321D
                                                                                                                                                                                          SHA1:671B7AC04580B56E2C34F88D123E8296947DDD7E
                                                                                                                                                                                          SHA-256:73FEB807006897B4B485CB82394867444E890265EFE960EC66D6C0E325DA9372
                                                                                                                                                                                          SHA-512:2498C380D761A16C183D78BC1BB18B1D2A1BFCB9C703D86A3FC04CCCE43D88C8D4BC3C47CC31639B78A5FE9C8A7445E9DBB52062E2F3B737DA1E7D0FF70F140A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Maputo)]} {.. LoadTimeZoneFile Africa/Maputo..}..set TZData(:Africa/Kigali) $TZData(:Africa/Maputo)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):180
                                                                                                                                                                                          Entropy (8bit):4.866127364448228
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2DcqQFeDcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2DdD4yn
                                                                                                                                                                                          MD5:41209A335A99803239A854575190C5ED
                                                                                                                                                                                          SHA1:E6EA627C25513B9DDE053F9A24D509AA317C30A1
                                                                                                                                                                                          SHA-256:611375C4901AD6C4844C2BB7D02FB17F34996F49E642546A6784D6F0B28530CC
                                                                                                                                                                                          SHA-512:DF2C0B131F35F54DF5EBF7F8459F98DBABEB6F081247BA95B5D7B41146E2A2EF9BC6B1D909DE57A1223D9C258AB197D9668ED2E111A365C86BABDAA7DF551FB6
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Kinshasa) $TZData(:Africa/Lagos)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):235
                                                                                                                                                                                          Entropy (8bit):4.7936510664790815
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2D4JDm2OHWQvvoHvBsp9boFvoHzIX7uRe6vF9:MB862DymdHWQCvqpmVCzIq
                                                                                                                                                                                          MD5:EC08046589E85D999A597252FF5368B7
                                                                                                                                                                                          SHA1:126E3DE158E1E7AF4737D0AB5B51C0F92F416DC7
                                                                                                                                                                                          SHA-256:DCC9F52F539A67DFD7ABAFDE072ACDAE2B67754C559C8A5FE61979F5A286A066
                                                                                                                                                                                          SHA-512:84B9AB18BC343C8B8934F5FDD2E2EB413925B04D6F5394AA8337B7B55E6487FB071A83A69BD4D0FA40F7F31EBC57B9908729674542CEA3083D700FCD02D77633
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Lagos) {.. {-9223372036854775808 815 0 LMT}.. {-2035584815 0 0 GMT}.. {-1940889600 815 0 LMT}.. {-1767226415 1800 0 +0030}.. {-1588465800 3600 0 WAT}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):182
                                                                                                                                                                                          Entropy (8bit):4.865878143076229
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2Dcr7bp4DcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2Dgfp4D4y
                                                                                                                                                                                          MD5:35D8A58EE21E603C6FC4FB896AE6B3D0
                                                                                                                                                                                          SHA1:F1D0A939D761F3F0954F045814CF5339A5597036
                                                                                                                                                                                          SHA-256:AB3E797548C7663CF9ABA7FE163635FF7CAB9E6CB61FA1644C0F7B4B5CCE8B99
                                                                                                                                                                                          SHA-512:97717961987F6B6832C24A7833150CDFE7E82BBEB32DFDB84D2500442AAD9263F8BD4E879591E913D56E9A1991C389EF730211853647A889F358AE3FA37C0185
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Libreville) $TZData(:Africa/Lagos)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):182
                                                                                                                                                                                          Entropy (8bit):4.862780607964543
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2Dcih4DcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2DNh4D4
                                                                                                                                                                                          MD5:EA21ABBF8B11953916A1C509B8A1B427
                                                                                                                                                                                          SHA1:35ADC230C57B001BE8A99A3D2E34B609A60A1162
                                                                                                                                                                                          SHA-256:EACA9124F17E5B11F27D11FA6141D19EB3AC23E155E155B73467BDAA3BC99AA7
                                                                                                                                                                                          SHA-512:A7972D4F1C5FB988CA04B39E2CDD580F51383BA9D7A66C478275C11A07B8D7A6EFF53A3E1929B0D89F10BCC39D22F285DB2601ED60DB4647C65465643F70C137
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Lome) $TZData(:Africa/Abidjan)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):178
                                                                                                                                                                                          Entropy (8bit):4.856982839546061
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2DccLtBQDcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2DXQD4yn
                                                                                                                                                                                          MD5:40CD47F6DCF51EBEFEF42489F1716257
                                                                                                                                                                                          SHA1:DF245192A1899A72DE01A57F6969AC060E841734
                                                                                                                                                                                          SHA-256:4C2FD1E44DFAAF0C0DD2EB56B84B538F1E2D84B301AB2CFB8EE7759783501444
                                                                                                                                                                                          SHA-512:D39BEB0EEF344B1A44F7D6A806A1D5B956D7D402648EE0C67C4BA46493236840AF975D89A91B2D33B8AA7D6DC9A051E66718DCDBC1C83B0E964215C2E32ED923
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Luanda) $TZData(:Africa/Lagos)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):185
                                                                                                                                                                                          Entropy (8bit):4.940313336280723
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsfKG5XHAIgNGEjKORL/2DcfpT0DcfKB:SlSWB9vsM3y7fnHAIgNTjdN/2D8pT0Dt
                                                                                                                                                                                          MD5:71A5DE1276902DB1542840318F9B1AF3
                                                                                                                                                                                          SHA1:AC3825BF343482E0E4D9D6FAA6FCA4D1A125433B
                                                                                                                                                                                          SHA-256:24384EEC359FD24D181AAEF3C017E3C345490A8D352B29D19B1B143A29A811C2
                                                                                                                                                                                          SHA-512:2984EB42A79B8B32BB93DFE71F1C4C0CABFDC9B0A199971347BB3473463FA07FDB5D20227D288BF8653B1BDE347E1297459BBB4C3C34AF7A5434FBF945683577
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Maputo)]} {.. LoadTimeZoneFile Africa/Maputo..}..set TZData(:Africa/Lubumbashi) $TZData(:Africa/Maputo)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):181
                                                                                                                                                                                          Entropy (8bit):4.905174746463853
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsfKG5XHAIgNGEjKORL/2DcOf+DcfKB:SlSWB9vsM3y7fnHAIgNTjdN/2DkDEi
                                                                                                                                                                                          MD5:1D7FDB388535CC59742CA0F1AEE27FBD
                                                                                                                                                                                          SHA1:A99FF2CAC47FD333429C22B271E190D979EEC024
                                                                                                                                                                                          SHA-256:B00801A7279741434D9C2D7EC7322DD93B85EA4F5C9976AB3A43F0AB142E1553
                                                                                                                                                                                          SHA-512:0174D3C6F9116C36C62AD1EB58203EE7DFE8C37F618B8449D5E45AD6290CF8334F28798877D7A563A12EE533026244D6A49BCCF29B5D7FCB5BCC91481D0DDDE2
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Maputo)]} {.. LoadTimeZoneFile Africa/Maputo..}..set TZData(:Africa/Lusaka) $TZData(:Africa/Maputo)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):178
                                                                                                                                                                                          Entropy (8bit):4.857096806490649
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2Dcn2DcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2D42D4yn
                                                                                                                                                                                          MD5:1CA9B3E7BCD5BC1CC881453D16B09389
                                                                                                                                                                                          SHA1:1B1964B314E72847D71A42C147CF2BF331B44461
                                                                                                                                                                                          SHA-256:35D56EFFE9E7E60F17B32BD30486E566B635F0AE7A8948D77395B8E6332E26F1
                                                                                                                                                                                          SHA-512:9E08D57B7824F5B076D159D9A5106E51450DF24729C36F485B9B68E8F47E8DFC50F9BEC3F11E0AE6579A8E372A5C0F0DA18A2E797CF2115519D1B4E5B64413DD
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Malabo) $TZData(:Africa/Lagos)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):149
                                                                                                                                                                                          Entropy (8bit):4.952872531197478
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/2DcfKiMXGm2OHoVoHvdSF2I:SlSWB9eg/2DEZDm2OHoVoHvdI
                                                                                                                                                                                          MD5:CD429B6891CBF603A93F9A9733E2391B
                                                                                                                                                                                          SHA1:C6833B83B6D1694AC632018A27915E6F97F708AE
                                                                                                                                                                                          SHA-256:FE6B6A4BE1B61F7F909A3F6137530DFE6D1754499A4D9B0D1CE4952FFF0AE62D
                                                                                                                                                                                          SHA-512:6E57B70B71515998AD617954F9DDAE19968B20946542201153DAB47FBE63790D42F41AE29148ECBCE6D12812879BCF0A4EC881507B62CDB2675AB20267220BF9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Maputo) {.. {-9223372036854775808 7820 0 LMT}.. {-2109291020 7200 0 CAT}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):199
                                                                                                                                                                                          Entropy (8bit):4.964472328419063
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7HbsSHAIgNTzbrN/2DZQs+DWb4n:MByMaHw7NH/t2DZiDWU
                                                                                                                                                                                          MD5:88C8FF2B480648EDADBD0FB93F754275
                                                                                                                                                                                          SHA1:BED7A784C378909914CEB0D303DFE6D05FD576B7
                                                                                                                                                                                          SHA-256:1D80FD86CB733D57D88ECD404E702F750B233ED0CCBFBFFFEED1AAD3B7F1CB04
                                                                                                                                                                                          SHA-512:CB7F831CF099E85B948AE57FCE9D91C7EAAD39753AF82C56EC15B65830EB4115A71BBC83A71A2AC947CAB24DEDDB557E02FAA5A3264546AE6E60607DF6BD2FA3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Johannesburg)]} {.. LoadTimeZoneFile Africa/Johannesburg..}..set TZData(:Africa/Maseru) $TZData(:Africa/Johannesburg)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):200
                                                                                                                                                                                          Entropy (8bit):4.957246428185456
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7HbsSHAIgNTzbrN/2DzjEHp4DWb4n:MByMaHw7NH/t2DzjEJ4DWU
                                                                                                                                                                                          MD5:CA7255B86425BA706D214924856B6818
                                                                                                                                                                                          SHA1:E9BE6CF871BB1786E842953D41392299952EC9AC
                                                                                                                                                                                          SHA-256:547197C09C1987350AE5720A4EEC7E8D8F4B9F4A0559726E225E13C707F7C564
                                                                                                                                                                                          SHA-512:23F9AD0F926A0945A17BBC3DCFF9A3D7EE68EC9423EA78985F5FFC60CC61641B57871F9AA703B5FB9BE842DCD4693D0641F9EDED702240873F58D24CD4D60C32
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Johannesburg)]} {.. LoadTimeZoneFile Africa/Johannesburg..}..set TZData(:Africa/Mbabane) $TZData(:Africa/Johannesburg)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):187
                                                                                                                                                                                          Entropy (8bit):4.877126792757121
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/2DcBEBXCEeDcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/2DFSVDR
                                                                                                                                                                                          MD5:5C2E2B5189E0E816D5BD7AFC8B49A35E
                                                                                                                                                                                          SHA1:4E43A1ED51399528636D6442B1DDFFD820911407
                                                                                                                                                                                          SHA-256:25E221BE49DEC5547A74AEB91B0041859C59BC866987272A447AB2343D1CC30C
                                                                                                                                                                                          SHA-512:B74735CFAB692756BAADFB1A51A8CC0C986F981D8E7E7A8182370A9017E67439875F0115820A349AFB3BE2FA581A721440968EF817471DD2C5E1286E53B2FE99
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Africa/Mogadishu) $TZData(:Africa/Nairobi)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):208
                                                                                                                                                                                          Entropy (8bit):4.8660011420394955
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2D3NPDm2OHrFGxYoHvlHIg5pTwdPsy:MB862D3NbmdHhmYCvdIg5GPsy
                                                                                                                                                                                          MD5:1B3C94B5098E454981C73C1F2AF80164
                                                                                                                                                                                          SHA1:1EBA9E2DBEA70BB1AE5EB13739518AB5A62D2130
                                                                                                                                                                                          SHA-256:2BF0D90610211651127402680519B29AB50B15D344263D0C1A22EDEBE5E01E27
                                                                                                                                                                                          SHA-512:DA4A0BCE7C6750BD7D3BA76B6301B9390723BE0C001C39BE453D80BD87020C2253A75629F68F83C19410D2A75FAF5223A435299CD4AA53DE545EC7C5B5AA54B7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Monrovia) {.. {-9223372036854775808 -2588 0 LMT}.. {-2776979812 -2588 0 MMT}.. {-1604359012 -2670 0 MMT}.. {63593070 0 0 GMT}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):277
                                                                                                                                                                                          Entropy (8bit):4.655052651600954
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2Dk1Dm2OHsvT5oH99VCV22ufPnVCkVBKBQn9q:MB862DGmdHsvVCjkifvdH9q
                                                                                                                                                                                          MD5:B640661FB37BB74FAB172DBDF1B433E1
                                                                                                                                                                                          SHA1:0236A5B53443A4A18B8B9D6AA7732620BE9A6553
                                                                                                                                                                                          SHA-256:BD8E9765174431C0D403249D3E881C949C83966E9F8162552DA88AE53132467B
                                                                                                                                                                                          SHA-512:53DCC6DF7C3E0B00A6D98A8DCC4988C8CFD6B53CC89E6F8D32DA41CB532A62D9C6A823675C5039F5639CE0D423F6D571F46F5B93FFC7EFFB4EDFFBF89D46AA12
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Nairobi) {.. {-9223372036854775808 8836 0 LMT}.. {-1946168836 9000 0 +0230}.. {-1309746600 10800 0 EAT}.. {-1261969200 9000 0 +0230}.. {-1041388200 9900 0 +0245}.. {-865305900 10800 0 EAT}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):208
                                                                                                                                                                                          Entropy (8bit):4.856754881865487
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2DjUfDm2OHNseoH1axCXFHzaSmkFWTvF9:MB862DjULmdHPC1XNzaS3yz
                                                                                                                                                                                          MD5:EDB548348E590C8CFE04ED172D96B86C
                                                                                                                                                                                          SHA1:AD3B631FB03819772164402E202AFA781687F597
                                                                                                                                                                                          SHA-256:9ADA5F5AFB25E823E1F0E8AD2489AAA1C09F01356634A9403670D7AB21CA2E2C
                                                                                                                                                                                          SHA-512:17E396A9BE497077B774AD1108CC8760ED35FC92F65FFF070F9ACD3C4FB67A335C1C57DF1CCB1570DE14B708EFCA0063990A969E30759C9A47731DA45ED25EFE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Ndjamena) {.. {-9223372036854775808 3612 0 LMT}.. {-1830387612 3600 0 WAT}.. {308703600 7200 1 WAST}.. {321314400 3600 0 WAT}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):178
                                                                                                                                                                                          Entropy (8bit):4.871519187180041
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2DcdhA9Ff2DcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2Dsh2f2D1
                                                                                                                                                                                          MD5:0134039CD1666E983A9B6E43ABD6AF59
                                                                                                                                                                                          SHA1:A2A99345390F4D17C892CEADE58C604257686764
                                                                                                                                                                                          SHA-256:B517120AD8DB3F21EAB4E44A78001EE856EB4EA35852C54CCA96D38887DEBCFA
                                                                                                                                                                                          SHA-512:E5911ADD3D776D87ACFC986C4D2564E3ED9AB12C67F23391ED35FF2A31AD8314B873E31DB8DA4D5E0DAEA12BE34110A8F0C27C9C6126977BAD51C6AD5CDFA39B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Niamey) $TZData(:Africa/Lagos)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):188
                                                                                                                                                                                          Entropy (8bit):4.909962899502589
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2DcboGb+DcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2Dqbb+c
                                                                                                                                                                                          MD5:550E482599C2F4280F2C258019BB2547
                                                                                                                                                                                          SHA1:A39045BEF313094CEDC100A7D695AE51BC9E498D
                                                                                                                                                                                          SHA-256:64CAF2BF9D45095DF97F419714D5617CF6300ACDB544B621DCE1D594AA9B910C
                                                                                                                                                                                          SHA-512:4FD29C5B4C0D2BDE69C437E9BF4F08A11E1DAAA689B69F28F3551F550BDCCDD055E4C1A241EDB2FA48B18825AFF792F4860F55983E106EA8224F1D87ED4F7546
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Nouakchott) $TZData(:Africa/Abidjan)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):189
                                                                                                                                                                                          Entropy (8bit):4.920023025906233
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2DcXCZDcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2D1DBS
                                                                                                                                                                                          MD5:6CFC4E938E50C9B591F8CC42A14FA82A
                                                                                                                                                                                          SHA1:FCE14A5CA62C9005C76D27B849A238E76C834F8A
                                                                                                                                                                                          SHA-256:03B9C1FE350B5E9F6F333F9519FA394DCC562308D9388A903AF3D3FECEBDC762
                                                                                                                                                                                          SHA-512:98F22F1D23A9930276A2D306A1473E64DC43547A16CFD01226E4F030A26A3CC4FDED77F790583CC5C078FC6DFCCE81C16A50879AE46A0D3A6F1FA98373F413C7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Ouagadougou) $TZData(:Africa/Abidjan)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):182
                                                                                                                                                                                          Entropy (8bit):4.893842293207225
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsGe/vXHAIgNGESuvHRL/2DcyTKM0DcGeyn:SlSWB9vsM3y7VXHAIgNTTN/2DQD4yn
                                                                                                                                                                                          MD5:6D979FCD225D5431C7391AE568C6409F
                                                                                                                                                                                          SHA1:6C9DCD222061CC00FD386773C6BB2861F3429A60
                                                                                                                                                                                          SHA-256:8FB8692DB9281AE2B087D704168BFD47D3D0901781FEF65BFD62FCB213BA6B50
                                                                                                                                                                                          SHA-512:32AFA6AF6BFC3D42CA636DD2B96906048EF1ADFBB135BB7E7B77C444FED99FDABB84FBBADF56EC63828FFA7B3371191FF1311822B1C75241EBD9CF602467088E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Lagos)]} {.. LoadTimeZoneFile Africa/Lagos..}..set TZData(:Africa/Porto-Novo) $TZData(:Africa/Lagos)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):234
                                                                                                                                                                                          Entropy (8bit):4.818597723513168
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2DXDm2OHH5oHvzdoH1aNbbFHRMy:MB862DTmdHH5CvzdC16bZRMy
                                                                                                                                                                                          MD5:28A5967C797F4B38FB63F823D6F07168
                                                                                                                                                                                          SHA1:17872E91683B884191D2E4C777FB79DCE6D73EE7
                                                                                                                                                                                          SHA-256:BA1D60DF2B41320F92A123A714E17E576C89383526B96E0541A464C3FBA415B7
                                                                                                                                                                                          SHA-512:B335E3D3268631F3A71F4BAD59740F3A5222344E8223C201B8FE885BAA7F1A550FA7778E498D6DC2111F41053856F50B21413AECCE84B80833EC8176F2A1009C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Sao_Tome) {.. {-9223372036854775808 1616 0 LMT}.. {-2713912016 -2205 0 LMT}.. {-1830384000 0 0 GMT}.. {1514768400 3600 0 WAT}.. {1546304400 0 0 GMT}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):186
                                                                                                                                                                                          Entropy (8bit):4.905303708777235
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2DcHdDcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2DwdDBS
                                                                                                                                                                                          MD5:F2D7F7BC4EA3629EC7F0E45300A0CFD2
                                                                                                                                                                                          SHA1:E7594D378C5DCFEB1E87E13AC79A026260D2E630
                                                                                                                                                                                          SHA-256:9D8009ACAB019B32B1E87AB10E0AC3765ABCABE8066318DA8CA4905D41562F72
                                                                                                                                                                                          SHA-512:795E58172907020C85CF0B10BBA35842D5F92872CCB3382DFDC787BAA504C79927FA23BC3104AD63541A95C44CA80977E8247846DE918A0B00963B970F4823D2
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Africa/Timbuktu) $TZData(:Africa/Abidjan)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):954
                                                                                                                                                                                          Entropy (8bit):4.151253074491018
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB862DrmdHrCDWR+f7Zn9ueRSmNvlTtuyI/ZBv8dq8Jw4VFZBZYEuAENSfp8kSYx:5veuDkWx3NdT18kbjjAkxTx
                                                                                                                                                                                          MD5:2DF9B050D82B06EB89DA908C31C1F1C9
                                                                                                                                                                                          SHA1:CB294E12560A98D5CEA3BA7004B5519B6C22BAAC
                                                                                                                                                                                          SHA-256:B447B6B1C351E77F22A2D77C0437F2BBB7D8BDFDFDC3D6285E0D260519CC7110
                                                                                                                                                                                          SHA-512:BBE281D551E9F8DA7B6BB08D809177615410A11E4B1184ABD220EA8B1F355B2BBC090C6BAAF7E07FD61286891388ECD4026D4433C4E4B6A8D201F8D95E174532
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Tripoli) {.. {-9223372036854775808 3164 0 LMT}.. {-1577926364 3600 0 CET}.. {-574902000 7200 1 CEST}.. {-512175600 7200 1 CEST}.. {-449888400 7200 1 CEST}.. {-347158800 7200 0 EET}.. {378684000 3600 0 CET}.. {386463600 7200 1 CEST}.. {402271200 3600 0 CET}.. {417999600 7200 1 CEST}.. {433807200 3600 0 CET}.. {449622000 7200 1 CEST}.. {465429600 3600 0 CET}.. {481590000 7200 1 CEST}.. {496965600 3600 0 CET}.. {512953200 7200 1 CEST}.. {528674400 3600 0 CET}.. {544230000 7200 1 CEST}.. {560037600 3600 0 CET}.. {575852400 7200 1 CEST}.. {591660000 3600 0 CET}.. {607388400 7200 1 CEST}.. {623196000 3600 0 CET}.. {641775600 7200 0 EET}.. {844034400 3600 0 CET}.. {860108400 7200 1 CEST}.. {875919600 7200 0 EET}.. {1352505600 3600 0 CET}.. {1364515200 7200 1 CEST}.. {1382662800 7200 0 EET}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1111
                                                                                                                                                                                          Entropy (8bit):4.150944563639585
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB862DHmdHjCvbB/lxRjntMVyoKCyFWeey0XSe/OSyHaCgmvLOcSFQSFeSTC6ZPJ:5LemvbplxRhbv+yuh2tIee6kvcw9Cy
                                                                                                                                                                                          MD5:0C99335A41D33AA8BC1EDA0CB4CDCBF5
                                                                                                                                                                                          SHA1:5CABC28D318FA5B8307429EA571FFF91EB8E1252
                                                                                                                                                                                          SHA-256:0760D1028E733888E43E7F1E057217DC2B52786029FCEC67B27EB69CC6A54938
                                                                                                                                                                                          SHA-512:C8FE685ACA46FD4836F3AABC15833F294E5EBED123A487D04E74A8C5668BDFAFB96D2326760452A6E5A1B9CC25AC6C3918D8C10A7F8EF737456640E3000BBA2F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Tunis) {.. {-9223372036854775808 2444 0 LMT}.. {-2797202444 561 0 PMT}.. {-1855958961 3600 0 CET}.. {-969242400 7200 1 CEST}.. {-950493600 3600 0 CET}.. {-941940000 7200 1 CEST}.. {-891136800 3600 0 CET}.. {-877827600 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-842918400 3600 0 CET}.. {-842223600 7200 1 CEST}.. {-828230400 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796269600 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-766634400 3600 0 CET}.. {231202800 7200 1 CEST}.. {243903600 3600 0 CET}.. {262825200 7200 1 CEST}.. {276044400 3600 0 CET}.. {581122800 7200 1 CEST}.. {591145200 3600 0 CET}.. {606870000 7200 1 CEST}.. {622594800 3600 0 CET}.. {641516400 7200 1 CEST}.. {654649200 3600 0 CET}.. {1114902000 7200 1 CEST}.. {1128038400 3600 0 CET}.. {1143334800 7200 1 CEST}.. {1162083600 3600 0 CET}.. {11747
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1649
                                                                                                                                                                                          Entropy (8bit):3.9974091170263066
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5t+Lmcz0iMHHWMbnHoMcHiM0H+MCySHr/MDHqMafHO8MwHJMHHOMHSHWMHHXM5Hs:OLjQDI6jZ2WFcv
                                                                                                                                                                                          MD5:4846FB13467BA93EB134D88228D7F534
                                                                                                                                                                                          SHA1:477FC6144B7DF365606A2E44EF1430F8DF6FB841
                                                                                                                                                                                          SHA-256:DFC3D1FC182B315B31D999BC103C264BD205EB16F971C8636003A71170D7BD7C
                                                                                                                                                                                          SHA-512:A719F5083F66CE44FE047880A10B2ED04B66E01C7F0F7DADAE2FFB95172308F091D669BCFED5A236D2A0F80A4A1D78DA7A778DDE3FAECB40170ECDA705573769
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Africa/Windhoek) {.. {-9223372036854775808 4104 0 LMT}.. {-2458170504 5400 0 +0130}.. {-2109288600 7200 0 SAST}.. {-860976000 10800 1 SAST}.. {-845254800 7200 0 SAST}.. {637970400 7200 0 CAT}.. {764200800 3600 1 WAT}.. {778640400 7200 0 CAT}.. {796780800 3600 1 WAT}.. {810090000 7200 0 CAT}.. {828835200 3600 1 WAT}.. {841539600 7200 0 CAT}.. {860284800 3600 1 WAT}.. {873594000 7200 0 CAT}.. {891734400 3600 1 WAT}.. {905043600 7200 0 CAT}.. {923184000 3600 1 WAT}.. {936493200 7200 0 CAT}.. {954633600 3600 1 WAT}.. {967942800 7200 0 CAT}.. {986083200 3600 1 WAT}.. {999392400 7200 0 CAT}.. {1018137600 3600 1 WAT}.. {1030842000 7200 0 CAT}.. {1049587200 3600 1 WAT}.. {1062896400 7200 0 CAT}.. {1081036800 3600 1 WAT}.. {1094346000 7200 0 CAT}.. {1112486400 3600 1 WAT}.. {1125795600 7200 0 CAT}.. {1143936000 3600 1 WAT}.. {1157245200 7200
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8447
                                                                                                                                                                                          Entropy (8bit):3.867931581740766
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:6hvOs5vveFaHU6lgqN/zNMkixlrxYTMcmo1LWF59:6hvOstgqN/zNMkArxiZmf
                                                                                                                                                                                          MD5:DF52E726B33FA47EB115C1233614E101
                                                                                                                                                                                          SHA1:26B0E49022FCB929F0160617F9C9D2DBEDC63610
                                                                                                                                                                                          SHA-256:77231D179260C08690A70AEE6C2517E4B621ED4794D9AEEA7040539F4FF05111
                                                                                                                                                                                          SHA-512:48AAF25419E07B06E076B0E19F9A0C27EB257556E62FD8F7B2AA963A817823DD89D33AB6AFEAAC2EF2230361D76776355E19CC2BBBB4D19536F823A347AC8AA4
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Adak) {.. {-9223372036854775808 44002 0 LMT}.. {-3225223727 -42398 0 LMT}.. {-2188944802 -39600 0 NST}.. {-883573200 -39600 0 NST}.. {-880196400 -36000 1 NWT}.. {-769395600 -36000 1 NPT}.. {-765374400 -39600 0 NST}.. {-757342800 -39600 0 NST}.. {-86878800 -39600 0 BST}.. {-31496400 -39600 0 BST}.. {-21466800 -36000 1 BDT}.. {-5745600 -39600 0 BST}.. {9982800 -36000 1 BDT}.. {25704000 -39600 0 BST}.. {41432400 -36000 1 BDT}.. {57758400 -39600 0 BST}.. {73486800 -36000 1 BDT}.. {89208000 -39600 0 BST}.. {104936400 -36000 1 BDT}.. {120657600 -39600 0 BST}.. {126709200 -36000 1 BDT}.. {152107200 -39600 0 BST}.. {162392400 -36000 1 BDT}.. {183556800 -39600 0 BST}.. {199285200 -36000 1 BDT}.. {215611200 -39600 0 BST}.. {230734800 -36000 1 BDT}.. {247060800 -39600 0 BST}.. {262789200 -36000 1 BDT}.. {278510400 -39600 0 BST}.. {29423880
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8685
                                                                                                                                                                                          Entropy (8bit):3.9620252256806845
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:esKLO6KLC9+j1giaJCUbtp0nFI+g/iexpCVaBnNnt61nctE1:etLhN9DiaJCUbPI+D/iMpCIBSuk
                                                                                                                                                                                          MD5:BFEACEA04AAA8A69A9AC71CF86BCC15C
                                                                                                                                                                                          SHA1:1693971B8AAA35021BA34799FB1B9FADC3DA0294
                                                                                                                                                                                          SHA-256:DE7FBE2B3ED780C6B82099E1E249DD41F4452A3ADB9DD807B1D0EC06049C2302
                                                                                                                                                                                          SHA-512:E94112A2A5F268C03C58CE3BB4C243B2B9B0FC17CB27FDD58BCD2CCC8D377B805C87A552AE7DE1C5698C5F2C4B0FCAB00A3420B1DAD944C1A2F7A47CE7118F78
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Anchorage) {.. {-9223372036854775808 50424 0 LMT}.. {-3225223727 -35976 0 LMT}.. {-2188951224 -36000 0 AST}.. {-883576800 -36000 0 AST}.. {-880200000 -32400 1 AWT}.. {-769395600 -32400 1 APT}.. {-765378000 -36000 0 AST}.. {-86882400 -36000 0 AHST}.. {-31500000 -36000 0 AHST}.. {-21470400 -32400 1 AHDT}.. {-5749200 -36000 0 AHST}.. {9979200 -32400 1 AHDT}.. {25700400 -36000 0 AHST}.. {41428800 -32400 1 AHDT}.. {57754800 -36000 0 AHST}.. {73483200 -32400 1 AHDT}.. {89204400 -36000 0 AHST}.. {104932800 -32400 1 AHDT}.. {120654000 -36000 0 AHST}.. {126705600 -32400 1 AHDT}.. {152103600 -36000 0 AHST}.. {162388800 -32400 1 AHDT}.. {183553200 -36000 0 AHST}.. {199281600 -32400 1 AHDT}.. {215607600 -36000 0 AHST}.. {230731200 -32400 1 AHDT}.. {247057200 -36000 0 AHST}.. {262785600 -32400 1 AHDT}.. {278506800 -36000 0 AHST}.. {294235200 -3
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):202
                                                                                                                                                                                          Entropy (8bit):4.908728298285591
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290/8J5290ppv:MByMYbpwt290/8m90b
                                                                                                                                                                                          MD5:1C3CE9F156ABECEAA794E8F1F3A7ADDB
                                                                                                                                                                                          SHA1:6F84D0A424FD2DE85E3420EA320A186B277B0295
                                                                                                                                                                                          SHA-256:F38610019C0A2C18AC71F5AA108B9647D9B5C01DCB55211AFB8312308C41FE70
                                                                                                                                                                                          SHA-512:CA2DA6F9551E4DBF775D7D059F6F3399E0C4F2A428699726CD2A1B0BB17CCF5CDEEF645EE1759A2A349F3F29E0343600B89CE1F4659CF5D2B58280A381C018AD
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Anguilla) $TZData(:America/Puerto_Rico)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):201
                                                                                                                                                                                          Entropy (8bit):4.898881450964165
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290//MFe90ppv:MByMYbpwt290//V90b
                                                                                                                                                                                          MD5:DB16FFE76D625DEC731AB6320F5EF9BF
                                                                                                                                                                                          SHA1:D286994E03E4F82C08DE094B436FA098648AFADE
                                                                                                                                                                                          SHA-256:561E58E11DC5A86CAE04B5CB40F43EFCFF9ABC0C841FAC094619E9C5E0B403F8
                                                                                                                                                                                          SHA-512:8842B616205378AF78B0B2FC3F6517385845DE30FFD477A21ACFA0060D161FB6462A3C266DCFD54F101729446B8E1B2ECF463C9CF2E6CE227B2628A19AF365F9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Antigua) $TZData(:America/Puerto_Rico)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1782
                                                                                                                                                                                          Entropy (8bit):3.733307964154526
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5KChlvEw6kSSx5H4a8tf3fkuozd23t8VZDG8+GCRRRd:QIlvEwJSSxdF8tfMuozdCt8VZy8+GCRB
                                                                                                                                                                                          MD5:9B01680A362EA7B462DC236F6A35E14C
                                                                                                                                                                                          SHA1:456A5E771F6B749BFDB2BFD59836A6A930499881
                                                                                                                                                                                          SHA-256:B1327CBEC20A21E3FF873E28A2EDFA271EE3A5C01933779300EABD6B185DA010
                                                                                                                                                                                          SHA-512:E6C2F5C489BEA31B0AAC3CB1DB750AC2B665DAC0AC82C1CE6756E768305300297BA5E3B32EDEB9E1715452F02223E47674C4F2B1844920F664623C9F34309240
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Araguaina) {.. {-9223372036854775808 -11568 0 LMT}.. {-1767214032 -10800 0 -03}.. {-1206957600 -7200 1 -03}.. {-1191362400 -10800 0 -03}.. {-1175374800 -7200 1 -03}.. {-1159826400 -10800 0 -03}.. {-633819600 -7200 1 -03}.. {-622069200 -10800 0 -03}.. {-602283600 -7200 1 -03}.. {-591832800 -10800 0 -03}.. {-570747600 -7200 1 -03}.. {-560210400 -10800 0 -03}.. {-539125200 -7200 1 -03}.. {-531352800 -10800 0 -03}.. {-191365200 -7200 1 -03}.. {-184197600 -10800 0 -03}.. {-155163600 -7200 1 -03}.. {-150069600 -10800 0 -03}.. {-128898000 -7200 1 -03}.. {-121125600 -10800 0 -03}.. {-99954000 -7200 1 -03}.. {-89589600 -10800 0 -03}.. {-68418000 -7200 1 -03}.. {-57967200 -10800 0 -03}.. {499748400 -7200 1 -03}.. {511236000 -10800 0 -03}.. {530593200 -7200 1 -03}.. {540266400 -10800 0 -03}.. {562129200 -7200 1 -03}.. {571197600 -10800 0 -03}
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2048
                                                                                                                                                                                          Entropy (8bit):3.7664759014118188
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5p9uuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafwwfFC8OS0wi:jIu3pfe92jCs/VOHv2kdeRtnxafwwfF0
                                                                                                                                                                                          MD5:2B9A1EDE5110B46E24F4726664EA1E3F
                                                                                                                                                                                          SHA1:939D1A7A50544F34B318ACDB52BC6930FE453F6D
                                                                                                                                                                                          SHA-256:BC86AC89121EC4AA302F6259CCC97EFFD7022DC6CEE3B291C57DA72B6EA0C558
                                                                                                                                                                                          SHA-512:C204740DACBCECF2CC5CF4FEB687E86B9150512623203C999D6F4EB5FB246D07681A35C28D8445F6A50F49940C321E0AA5E51FE5A73B8ED076F29CEB5B4D4CA2
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Buenos_Aires) {.. {-9223372036854775808 -14028 0 LMT}.. {-2372097972 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-7522
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2077
                                                                                                                                                                                          Entropy (8bit):3.742645155048276
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5/nuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafww3mC8OS0NC:Vuu3pfe92jCs/VOHv2kdeRtnxafww3mP
                                                                                                                                                                                          MD5:3D2AF5714DFC392ED4BC976784D5A58A
                                                                                                                                                                                          SHA1:9252DE40B6EF872E1D2F7CDD53DDD21145E93C5C
                                                                                                                                                                                          SHA-256:A516BB0937977EF949D47B3C8675E30F1CA6C34F8BD298DCF6EBB943580D5317
                                                                                                                                                                                          SHA-512:8D5FFDB5B578B8EA0291D3A21BDDE25F8301CB16B11AE794FFBA8DCFFE46F6AC5EC03D93E511061B132D84E69E5FAF1BB212837EB8A5A4B4BE517F783837E615
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Catamarca) {.. {-9223372036854775808 -15788 0 LMT}.. {-2372096212 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-7522740
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):242
                                                                                                                                                                                          Entropy (8bit):4.72138001874583
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7/MMXAXHAIgp/MMXmRN/290/MquQ90/MMXAy:MByMY/MYp/MrRt290/MquQ90/MK
                                                                                                                                                                                          MD5:8A609667DE461CEDC1127BE38B161459
                                                                                                                                                                                          SHA1:557D2D55DEA38D1CD1103E183F89C65F4016662B
                                                                                                                                                                                          SHA-256:8CCD6FC77D55582938F1912B1BA66035882D1BFC18A797C631E5E89ABFBF570B
                                                                                                                                                                                          SHA-512:DBAFDA069DB5FDBCBA11050AC91A733C1712BD6395939CFFFC5EAA78BD0B70B4AF2D9FB8954C6841CCF3AC5F8EDCF08E604D3F2CF67F1CBEA5EB6D3C4DC7F2FA
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Argentina/Catamarca)]} {.. LoadTimeZoneFile America/Argentina/Catamarca..}..set TZData(:America/Argentina/ComodRivadavia) $TZData(:America/Argentina/Catamarca)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2043
                                                                                                                                                                                          Entropy (8bit):3.7481312409221594
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5lxQuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafww3mC8OS0n:/xBu3pfe92jCs/VOHv2kdeRtnxafww3j
                                                                                                                                                                                          MD5:8C1D665A25E61CE462C2AC57687763BF
                                                                                                                                                                                          SHA1:B5BBC26CF6A24BD5BEA42AC485D62C789B80905F
                                                                                                                                                                                          SHA-256:FA75E274240A341C6BFE3539CFDC114D125AEAEA3161D3C2409347CF8046042A
                                                                                                                                                                                          SHA-512:A89A7A92C025B87DA4CDFE99BF70CD0E64690D7BFE827DCBFBF0E91B188003FA26487E72B6B950D3BFC9C854B890E5936F414BBEAAD5F3F0673AC5EFE273CDF4
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Cordoba) {.. {-9223372036854775808 -15408 0 LMT}.. {-2372096592 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-752274000
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2041
                                                                                                                                                                                          Entropy (8bit):3.7481290145270245
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5HluuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafwcSPAC8OS0E:xwu3pfe92jCs/VOHv2kdeRtnxafwcDCK
                                                                                                                                                                                          MD5:995EDE9E1E86DB500C7437A196325E21
                                                                                                                                                                                          SHA1:4A8FB1511AA124CA2D299EC8DE155EE9D0479180
                                                                                                                                                                                          SHA-256:43EB79ABC03CBAC661C563DE1BC09D9DD855CBC72DD2B6467EA98F0F90421BA9
                                                                                                                                                                                          SHA-512:B58B35EA1B2F0388B8108DCF254F3BD1B21894F00A9F313ABC093BC52C36FCDD94B7486DBA38161C9EFCDB12BC3CD81E7E02395B0CA480A7F01148C43CD3054F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Jujuy) {.. {-9223372036854775808 -15672 0 LMT}.. {-2372096328 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-752274000 -
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2106
                                                                                                                                                                                          Entropy (8bit):3.744252944523733
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5lduuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafwwkFC8OS0NC:Tou3pfe92jCs/VOHv2kdeRtnxafwwkFP
                                                                                                                                                                                          MD5:4A45A063D45EB94214005EF3CA5BCD6D
                                                                                                                                                                                          SHA1:2420E8591DC53A39EE1A58B2E45DCFAF9503685F
                                                                                                                                                                                          SHA-256:2B018B791E48269FA9EDA12662FFEC3E2DC33603A918E8B735B8D7D6BEB3B3AA
                                                                                                                                                                                          SHA-512:0B2824FA3D40B2EDBE8488D50C30368F4CF6E45A39FF6DEBC5BB4FD86F85AD52F5331AD1EB50E5166FA2E735B7E8AA9D94A5FED9421334DB0499524DBE08F737
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/La_Rioja) {.. {-9223372036854775808 -16044 0 LMT}.. {-2372095956 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-75227400
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2077
                                                                                                                                                                                          Entropy (8bit):3.738002814507529
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5CPBuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafwGSmSc8OSI:GUu3pfe92jCs/VOHv2kdeRtnxafwGJld
                                                                                                                                                                                          MD5:F6CB24E8567B2443224E9E17EE438BFE
                                                                                                                                                                                          SHA1:8029426C30C4C645EA77C6240391CDB1C3107568
                                                                                                                                                                                          SHA-256:DC39400BBFD5BDDDC174FE099194806FBFD3FC3AA20E670D67BE0AC35FE97AD4
                                                                                                                                                                                          SHA-512:6869CFC24C21FBB2DFCCAA9AE7E21A0B24DC002EE792FB28A8F2F05C75C20E93C95A39BD8653AA272AF10FE95922B99EECC1208AACE814817D9441F84360E867
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Mendoza) {.. {-9223372036854775808 -16516 0 LMT}.. {-2372095484 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-752274000
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2080
                                                                                                                                                                                          Entropy (8bit):3.7580685839169545
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5oQuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafwwfFC8OS0NC:qBu3pfe92jCs/VOHv2kdeRtnxafwwfFP
                                                                                                                                                                                          MD5:212D13CE27AF114A8EC2E04023D218C4
                                                                                                                                                                                          SHA1:C4C5F86BC6EC0D5EA4C9CF199309D085767B97E8
                                                                                                                                                                                          SHA-256:A05B6708DEFF0607396BFC6661C2287341C3432841AE353D94A67AC742B5FAFA
                                                                                                                                                                                          SHA-512:CE7201EEA6A86FB49641410D2EEE4030EDB1B96F3218D764762F5AE23883C796F5742ED69CEC985A9D3582D6C72ED74114DE81508F6DEB4B54865B6974ADC965
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Rio_Gallegos) {.. {-9223372036854775808 -16612 0 LMT}.. {-2372095388 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-7522
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2011
                                                                                                                                                                                          Entropy (8bit):3.7415813345133975
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5NPuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafww3mC8OS0wF:72u3pfe92jCs/VOHv2kdeRtnxafww3mz
                                                                                                                                                                                          MD5:A06C33CDFD7E7B630CB1DF34E72E61E5
                                                                                                                                                                                          SHA1:694826B9B910DA0BD70A9CB547C26E6838B08111
                                                                                                                                                                                          SHA-256:CAEFC60F2F36EF9FFE0C5921C3C392DE1E95755683A96C1C4EC0BA2C242A4D84
                                                                                                                                                                                          SHA-512:D6696A6C14EECF2B77EC586F40137BDD95E5CE5C5193570C809FAB9E5FCA4B8744283CEB6818E525C73F6EFF657274410B2622902EE8C15912C8D5F5FA5C805E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Salta) {.. {-9223372036854775808 -15700 0 LMT}.. {-2372096300 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-752274000 -
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2106
                                                                                                                                                                                          Entropy (8bit):3.747934819596411
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5vXxuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafwwkFC8OS0K:hUu3pfe92jCs/VOHv2kdeRtnxafwwkFl
                                                                                                                                                                                          MD5:32A50D0ABF408D9E59C0580D5B8CC472
                                                                                                                                                                                          SHA1:EA5BB8860982F8BAFEAEFDE1D6ACD440DA132DFE
                                                                                                                                                                                          SHA-256:41B2C25E42146A76934B866061BB3245B8ADA0FF4E1BFBA6F8842A30BDD5C132
                                                                                                                                                                                          SHA-512:E5D2521A4EF53AAD3E74506708EC2768C4D2EE8D6D014DCCF4A6DC290B713B4D46021B66527548C35004E10D753E1B685EEFD55BBE7BF01EC6104D7D8AAC4403
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/San_Juan) {.. {-9223372036854775808 -16444 0 LMT}.. {-2372095556 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-75227400
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2081
                                                                                                                                                                                          Entropy (8bit):3.7399269084699975
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5MDuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafw6bS2nZSbdI:yCu3pfe92jCs/VOHv2kdeRtnxafwWnZr
                                                                                                                                                                                          MD5:FB06B66F5D41709C7E85C8B1E9BFCFA0
                                                                                                                                                                                          SHA1:D5C0C4B12C6190856C300321B1C106C7474BA54B
                                                                                                                                                                                          SHA-256:A43B35F25E54EF359D046E33281C0A978F0EE8811C93A6809F1F65750878BBB6
                                                                                                                                                                                          SHA-512:D445F46D6A17A075AD995885E45234A711F53BF3FE2DFC6DFBB611E8AC154B10C91E137927DD66D6A7C596A93BAE5DE283796F341B5095FA0DD05595E1C3A077
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/San_Luis) {.. {-9223372036854775808 -15924 0 LMT}.. {-2372096076 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-75227400
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2105
                                                                                                                                                                                          Entropy (8bit):3.741704529449777
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5yZujuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafww3mC8OSf:suiu3pfe92jCs/VOHv2kdeRtnxafww3w
                                                                                                                                                                                          MD5:D9497141EC0DC172E5FF5304FED0BE6B
                                                                                                                                                                                          SHA1:CD20A4F0C127A84791093010D59DF119DD32340A
                                                                                                                                                                                          SHA-256:0F7DB23E1280FC19A1FB716E09A9699ADA2AAE24084CAD472B4C325CC9783CCF
                                                                                                                                                                                          SHA-512:0B71952055013CD6045ED209FD98168083550655FAB91B7870C92098E40C4FE6827EAAF922D34ECE28298CBB14327A76AD6780D480E552F52F865AA11A4AA083
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Tucuman) {.. {-9223372036854775808 -15652 0 LMT}.. {-2372096348 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-752274000
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2075
                                                                                                                                                                                          Entropy (8bit):3.7445758155279836
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5SHuuSYSaSISBS2ShSmSLVS+E1/SKSZSGRSoSpS7S6S4wRSenSOafwwfFC8OS0jE:YOu3pfe92jCs/VOHv2kdeRtnxafwwfFn
                                                                                                                                                                                          MD5:16A89FD2CDEE50E534301A9797311A9D
                                                                                                                                                                                          SHA1:4A4EBA1798214C7CF5ACDC0B2EC8B4716CD968CB
                                                                                                                                                                                          SHA-256:10B6FF51314D8EE1D010187D8805C4E3D71B778BC6DECB26E66193A5BB3E9EA2
                                                                                                                                                                                          SHA-512:DBB0BA3F8AA2B54C86EA8B6530C16DF95AF1331FC5F843B113A204DA20B8EF011FE93C27EB917D01B9040D4914057687B4AACCD292A847559AF69150D1BDC4B5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Argentina/Ushuaia) {.. {-9223372036854775808 -16392 0 LMT}.. {-2372095608 -15408 0 CMT}.. {-1567453392 -14400 0 -04}.. {-1233432000 -10800 0 -04}.. {-1222981200 -14400 0 -04}.. {-1205956800 -10800 1 -04}.. {-1194037200 -14400 0 -04}.. {-1172865600 -10800 1 -04}.. {-1162501200 -14400 0 -04}.. {-1141329600 -10800 1 -04}.. {-1130965200 -14400 0 -04}.. {-1109793600 -10800 1 -04}.. {-1099429200 -14400 0 -04}.. {-1078257600 -10800 1 -04}.. {-1067806800 -14400 0 -04}.. {-1046635200 -10800 1 -04}.. {-1036270800 -14400 0 -04}.. {-1015099200 -10800 1 -04}.. {-1004734800 -14400 0 -04}.. {-983563200 -10800 1 -04}.. {-973198800 -14400 0 -04}.. {-952027200 -10800 1 -04}.. {-941576400 -14400 0 -04}.. {-931032000 -10800 1 -04}.. {-900882000 -14400 0 -04}.. {-890337600 -10800 1 -04}.. {-833749200 -14400 0 -04}.. {-827265600 -10800 1 -04}.. {-752274000
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):199
                                                                                                                                                                                          Entropy (8bit):4.893042770292303
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290/V90ppv:MByMYbpwt290/V90b
                                                                                                                                                                                          MD5:CC015E3E5D3293CAA1348B4E0EE5795C
                                                                                                                                                                                          SHA1:75E7EFD905C9001CE9CA5872DA3915A19BCB00E0
                                                                                                                                                                                          SHA-256:7490CD66408B8A14C549278FE67DC3338FE9E458F423F01CCBEA00B5E6F6CEF6
                                                                                                                                                                                          SHA-512:66523F050E4A42A1C9FC8C02B822CD3864A6E35F6364FB6A675F2A503BD8030FE6E380B252068668A79A6593B5042520EE40700DA033517742B3F0ED33D79DAF
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Aruba) $TZData(:America/Puerto_Rico)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7944
                                                                                                                                                                                          Entropy (8bit):3.5156463862656775
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:j7RXBXLqbvdvZsV4GGdzVUFg7XaMOhKpJq3o5GMJq90vRFhjGF3RxTBhcXBACBLo:jEJgXh
                                                                                                                                                                                          MD5:181203CAD98E94355B9914A205514904
                                                                                                                                                                                          SHA1:D361CB53955437270905A9432DE9E7F6C1AE7189
                                                                                                                                                                                          SHA-256:EAEFE21276EE60C7F876C1D65039999AC069339DCDB82A23FC9206C274510575
                                                                                                                                                                                          SHA-512:AE9262DFC35579AEB610DF8BB5F7FBB49232195F55F78402405017681F72C0D2A09FA9EB605B406065A1F44FE6785AC0163870C921DAFFC4746DA6EDA3081521
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Asuncion) {.. {-9223372036854775808 -13840 0 LMT}.. {-2524507760 -13840 0 AMT}.. {-1206389360 -14400 0 -04}.. {86760000 -10800 0 -03}.. {134017200 -14400 0 -04}.. {162878400 -14400 0 -04}.. {181368000 -10800 1 -04}.. {194497200 -14400 0 -04}.. {212990400 -10800 1 -04}.. {226033200 -14400 0 -04}.. {244526400 -10800 1 -04}.. {257569200 -14400 0 -04}.. {276062400 -10800 1 -04}.. {291783600 -14400 0 -04}.. {307598400 -10800 1 -04}.. {323406000 -14400 0 -04}.. {339220800 -10800 1 -04}.. {354942000 -14400 0 -04}.. {370756800 -10800 1 -04}.. {386478000 -14400 0 -04}.. {402292800 -10800 1 -04}.. {418014000 -14400 0 -04}.. {433828800 -10800 1 -04}.. {449636400 -14400 0 -04}.. {465451200 -10800 1 -04}.. {481172400 -14400 0 -04}.. {496987200 -10800 1 -04}.. {512708400 -14400 0 -04}.. {528523200 -10800 1 -04}.. {544244400 -14400 0 -04}.. {5
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):187
                                                                                                                                                                                          Entropy (8bit):4.791603790249234
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0u55DyXHAIg20u5cvRL/2IAcGE/qlOi+4IAcGEu5B:SlSWB9vsM3y7oDSHAIgpdN/290/qlf+M
                                                                                                                                                                                          MD5:5A45B70C79F533548B3DD332F988E15B
                                                                                                                                                                                          SHA1:C7485828619A1D4F5CA59D80ABD197100AC58F64
                                                                                                                                                                                          SHA-256:518BEB6E54AE811F8C725EA8CC42787D48FC605A3476D6E7A00A1B5733CBD6AC
                                                                                                                                                                                          SHA-512:A81C2EBE282E019ED011EADDB8F74C3E6FBE88D87E8D8706B3022CDCC48EF92AD90F9BCF9F25031664BB6EFE069EAFDD23D9B55BF672FC7528A2DD8CB6B986B4
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Panama)]} {.. LoadTimeZoneFile America/Panama..}..set TZData(:America/Atikokan) $TZData(:America/Panama)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):177
                                                                                                                                                                                          Entropy (8bit):4.812527147763069
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0/yO5WXHAIg20/yOoNvWARL/2IAcGE/ol7x+IAcGs:SlSWB9vsM3y7/yrHAIgp/yH0AN/290/e
                                                                                                                                                                                          MD5:13479F64BFBDC7583C637E1562C454B4
                                                                                                                                                                                          SHA1:2F59484C779B0D6033FC14E205DA9BCAB7A5FCB1
                                                                                                                                                                                          SHA-256:1D6FEE336E71FFFB64874A830C976867C071EBF6B133C296B32F87E3E7D814C9
                                                                                                                                                                                          SHA-512:D2C5D35BBBDAB8D58BF6185328124796C06B67ADFB4C1828BA5A9CCA500A01BB8BE69635AE7EEA7FA837A27B20D488A08A29B121DD1617BC373390AD95D67E39
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Adak)]} {.. LoadTimeZoneFile America/Adak..}..set TZData(:America/Atka) $TZData(:America/Adak)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2012
                                                                                                                                                                                          Entropy (8bit):3.703391569010329
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5/ChlvEw6kSSx5H4a8tf3fku+da2XUd23t8VZDG8+GyOd:VIlvEwJSSxdF8tfMu+da2kdCt8VZy8+K
                                                                                                                                                                                          MD5:69DCC2477D8D81E2F49D295DB6907190
                                                                                                                                                                                          SHA1:3C6ED0CEF15D3265C962873480EE1809A4DCACA2
                                                                                                                                                                                          SHA-256:64F1EC14F6B43FF10B564F839152E88DF9262F0947D1DB347557FA902F6FD48C
                                                                                                                                                                                          SHA-512:71DEA6D47F267AA7326A011872FA74762FA4F8CD57EB149E3B56B3DE9097B0B9258BC4F6C29188B49FC60C1942869B92D9E59FEE6980A5DA5D0029C383D99F39
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Bahia) {.. {-9223372036854775808 -9244 0 LMT}.. {-1767216356 -10800 0 -03}.. {-1206957600 -7200 1 -03}.. {-1191362400 -10800 0 -03}.. {-1175374800 -7200 1 -03}.. {-1159826400 -10800 0 -03}.. {-633819600 -7200 1 -03}.. {-622069200 -10800 0 -03}.. {-602283600 -7200 1 -03}.. {-591832800 -10800 0 -03}.. {-570747600 -7200 1 -03}.. {-560210400 -10800 0 -03}.. {-539125200 -7200 1 -03}.. {-531352800 -10800 0 -03}.. {-191365200 -7200 1 -03}.. {-184197600 -10800 0 -03}.. {-155163600 -7200 1 -03}.. {-150069600 -10800 0 -03}.. {-128898000 -7200 1 -03}.. {-121125600 -10800 0 -03}.. {-99954000 -7200 1 -03}.. {-89589600 -10800 0 -03}.. {-68418000 -7200 1 -03}.. {-57967200 -10800 0 -03}.. {499748400 -7200 1 -03}.. {511236000 -10800 0 -03}.. {530593200 -7200 1 -03}.. {540266400 -10800 0 -03}.. {562129200 -7200 1 -03}.. {571197600 -10800 0 -03}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):6847
                                                                                                                                                                                          Entropy (8bit):3.8753284304113196
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5pUSdFS1Y3FUlWQnH7eelN5Lh9LY5LpfLyZ3Moonskfm10qNKAqyQUrBbp7uos6u:DG1sehpYtpjyrz7nKED4KPddGEYA/Gx
                                                                                                                                                                                          MD5:E7EF08880C64C898BB7A5266EBF1A47A
                                                                                                                                                                                          SHA1:E2D2F36961C9CADB2736FFAF2DBA9A1F4B372DBD
                                                                                                                                                                                          SHA-256:B24AE5FA20F5329644529F660EEC8BAA3B966F9730AF58F1C21E94C02AE17228
                                                                                                                                                                                          SHA-512:6C47D875682CCE8B769EB0458CEC20FB8D4950A70D6904A32CED803D30F8B407828D7A12B4F560CF6B86541E985817B4394F9AEAAFEAA80593B5B42BA92D38CB
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Bahia_Banderas) {.. {-9223372036854775808 -25260 0 LMT}.. {-1514739600 -25200 0 MST}.. {-1343066400 -21600 0 CST}.. {-1234807200 -25200 0 MST}.. {-1220292000 -21600 0 CST}.. {-1207159200 -25200 0 MST}.. {-1191344400 -21600 0 CST}.. {-873828000 -25200 0 MST}.. {-661539600 -28800 0 PST}.. {28800 -25200 0 MST}.. {828867600 -21600 1 MDT}.. {846403200 -25200 0 MST}.. {860317200 -21600 1 MDT}.. {877852800 -25200 0 MST}.. {891766800 -21600 1 MDT}.. {909302400 -25200 0 MST}.. {923216400 -21600 1 MDT}.. {941356800 -25200 0 MST}.. {954666000 -21600 1 MDT}.. {972806400 -25200 0 MST}.. {989139600 -21600 1 MDT}.. {1001836800 -25200 0 MST}.. {1018170000 -21600 1 MDT}.. {1035705600 -25200 0 MST}.. {1049619600 -21600 1 MDT}.. {1067155200 -25200 0 MST}.. {1081069200 -21600 1 MDT}.. {1099209600 -25200 0 MST}.. {1112518800 -21600 1 MDT}.. {1130659200
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):648
                                                                                                                                                                                          Entropy (8bit):4.251560000277241
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB86290eWmdH9Colj/uFkv/lC1/uFkOzQs/lps/Ozfah/OzT/lN/uFkX/ll/uFki:5TWeUo5Skv/Y1SkA/g/Bh/m/rSkX/zSt
                                                                                                                                                                                          MD5:DC4FA44B2174A4E6F0644FA8EA2E83F9
                                                                                                                                                                                          SHA1:C12DF8C862A05D569EAF189272F8BF44303595A1
                                                                                                                                                                                          SHA-256:FD5E04136506C6543A9ACDC890A30BCF0D561148E1063EC857E3913DE1EBA404
                                                                                                                                                                                          SHA-512:5AC307CD48132B57215CCBAF0BB63F7FA9C5B28DC9F6217C905885D75B0DF131238D4DB2AE707C3DDEE2EDE6C0914644B435FB1CDD9913600D8B69AE95578B0F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Barbados) {.. {-9223372036854775808 -14309 0 LMT}.. {-1841256091 -14400 0 AST}.. {-874263600 -10800 1 ADT}.. {-862682400 -14400 0 AST}.. {-841604400 -10800 1 ADT}.. {-830714400 -14400 0 AST}.. {-820526400 -14400 0 -0330}.. {-811882800 -12600 1 AST}.. {-798660000 -14400 0 -0330}.. {-788904000 -14400 0 AST}.. {234943200 -10800 1 ADT}.. {244616400 -14400 0 AST}.. {261554400 -10800 1 ADT}.. {276066000 -14400 0 AST}.. {293004000 -10800 1 ADT}.. {307515600 -14400 0 AST}.. {325058400 -10800 1 ADT}.. {338706000 -14400 0 AST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1031
                                                                                                                                                                                          Entropy (8bit):3.8842563546204225
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5fe300cChlrLPsw6kSS3h5R14eH8tf3xd:5+CChlvEw6kSSx5H4a8tf3xd
                                                                                                                                                                                          MD5:DFA5E50F6AEF1311A4CF74970477E390
                                                                                                                                                                                          SHA1:5B63676EB8039B2BE767BAA44820F2DAE5B62876
                                                                                                                                                                                          SHA-256:549625CCB30BD0E025BAC47668BA3AA0CDD8569E5887E483C8D62B5B7302FA50
                                                                                                                                                                                          SHA-512:4BBB43694E3B54339C549AC3A5488B77366DB1189D8D1834DCF618D9448084A950B575E207064521B1CDFD2E41F7D1D8C5CD9CEB4668D4459585649556136EB0
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Belem) {.. {-9223372036854775808 -11636 0 LMT}.. {-1767213964 -10800 0 -03}.. {-1206957600 -7200 1 -03}.. {-1191362400 -10800 0 -03}.. {-1175374800 -7200 1 -03}.. {-1159826400 -10800 0 -03}.. {-633819600 -7200 1 -03}.. {-622069200 -10800 0 -03}.. {-602283600 -7200 1 -03}.. {-591832800 -10800 0 -03}.. {-570747600 -7200 1 -03}.. {-560210400 -10800 0 -03}.. {-539125200 -7200 1 -03}.. {-531352800 -10800 0 -03}.. {-191365200 -7200 1 -03}.. {-184197600 -10800 0 -03}.. {-155163600 -7200 1 -03}.. {-150069600 -10800 0 -03}.. {-128898000 -7200 1 -03}.. {-121125600 -10800 0 -03}.. {-99954000 -7200 1 -03}.. {-89589600 -10800 0 -03}.. {-68418000 -7200 1 -03}.. {-57967200 -10800 0 -03}.. {499748400 -7200 1 -03}.. {511236000 -10800 0 -03}.. {530593200 -7200 1 -03}.. {540266400 -10800 0 -03}.. {562129200 -7200 1 -03}.. {571197600 -10800 0 -03}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):3284
                                                                                                                                                                                          Entropy (8bit):3.8546064195941097
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5pKSxZwR9IVQU55DG5krgGN8wW+YeD1yyfCwoc:HKSjgIVzrG5krRN8wWheD1yu
                                                                                                                                                                                          MD5:4DA622B685B3B075CC94FC4E23322547
                                                                                                                                                                                          SHA1:DEB23F0A434549DAE1BE60ACF757BB212C907B92
                                                                                                                                                                                          SHA-256:E07F45264E28FD5AA54BD48CB701658509829CF989EC9BD79498D070A1BA270F
                                                                                                                                                                                          SHA-512:9B00BF8870BC4AAEF7F06FCDFEEEF54686A2CC890103696631EB4DEF5AEEAD051EC9069D70A2B22397F18C0067E03A54E75DA18474D6B1BD3BDA2D5313E0AD16
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Belize) {.. {-9223372036854775808 -21168 0 LMT}.. {-1822500432 -21600 0 CST}.. {-1616954400 -19800 1 -0530}.. {-1606069800 -21600 0 CST}.. {-1585504800 -19800 1 -0530}.. {-1574015400 -21600 0 CST}.. {-1554055200 -19800 1 -0530}.. {-1542565800 -21600 0 CST}.. {-1522605600 -19800 1 -0530}.. {-1511116200 -21600 0 CST}.. {-1490551200 -19800 1 -0530}.. {-1479666600 -21600 0 CST}.. {-1459101600 -19800 1 -0530}.. {-1448217000 -21600 0 CST}.. {-1427652000 -19800 1 -0530}.. {-1416162600 -21600 0 CST}.. {-1396202400 -19800 1 -0530}.. {-1384713000 -21600 0 CST}.. {-1364752800 -19800 1 -0530}.. {-1353263400 -21600 0 CST}.. {-1333303200 -19800 1 -0530}.. {-1321813800 -21600 0 CST}.. {-1301248800 -19800 1 -0530}.. {-1290364200 -21600 0 CST}.. {-1269799200 -19800 1 -0530}.. {-1258914600 -21600 0 CST}.. {-1238349600 -19800 1 -0530}.. {-1226860200 -21600
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):206
                                                                                                                                                                                          Entropy (8bit):4.938043196147077
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290F490ppv:MByMYbpwt290S90b
                                                                                                                                                                                          MD5:09FD8280CC890F238126F9641DB7C90E
                                                                                                                                                                                          SHA1:98AB4E0DE8173C2BB2532B07FAE2E71F588AB26F
                                                                                                                                                                                          SHA-256:FACD0A835D1F425CD323EE453ADE231810B2D1CF6EBA227BA1B50522AE3879F7
                                                                                                                                                                                          SHA-512:117C24389B7BFB079F4409B1FA6AA547654D7C69A6CBB19218BF2B96F6CFE3CBAAD400D4C2EFE8A9BFE25F44402057427FC8A62DC20A98018D23A7CF9B87401F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Blanc-Sablon) $TZData(:America/Puerto_Rico)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1199
                                                                                                                                                                                          Entropy (8bit):3.7988385604912893
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5EThevwnSRs//SFs/pS9/MHSW/WOSr/nSso/TSL/SSU/iS5X/LcSi/xScd/ZlSQZ:5EHSeSFESoSQSrSsCSeSPS1cSQSQlSsp
                                                                                                                                                                                          MD5:9529221F9B4E104CC598491703B10E6C
                                                                                                                                                                                          SHA1:5ACD61B525A18DE1919A7484C92EC5D787DF2F25
                                                                                                                                                                                          SHA-256:10592EA1CB0D02C06A61059EC601F70A706A5053AC923B9EED29388D5E71EF3A
                                                                                                                                                                                          SHA-512:66BEDB631469651A5E426155428764E3C1C14483E6FEE1505812E8676EB6E82CF0A88F6CC697F03FDA0AF906D91C7DE6E940DF3D33DD247BEF51DBD9A13DEE16
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Boa_Vista) {.. {-9223372036854775808 -14560 0 LMT}.. {-1767211040 -14400 0 -04}.. {-1206954000 -10800 1 -04}.. {-1191358800 -14400 0 -04}.. {-1175371200 -10800 1 -04}.. {-1159822800 -14400 0 -04}.. {-633816000 -10800 1 -04}.. {-622065600 -14400 0 -04}.. {-602280000 -10800 1 -04}.. {-591829200 -14400 0 -04}.. {-570744000 -10800 1 -04}.. {-560206800 -14400 0 -04}.. {-539121600 -10800 1 -04}.. {-531349200 -14400 0 -04}.. {-191361600 -10800 1 -04}.. {-184194000 -14400 0 -04}.. {-155160000 -10800 1 -04}.. {-150066000 -14400 0 -04}.. {-128894400 -10800 1 -04}.. {-121122000 -14400 0 -04}.. {-99950400 -10800 1 -04}.. {-89586000 -14400 0 -04}.. {-68414400 -10800 1 -04}.. {-57963600 -14400 0 -04}.. {499752000 -10800 1 -04}.. {511239600 -14400 0 -04}.. {530596800 -10800 1 -04}.. {540270000 -14400 0 -04}.. {562132800 -10800 1 -04}.. {571201200
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):246
                                                                                                                                                                                          Entropy (8bit):4.705337479465446
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/290bJhDm2OHDgoHvcuknov/zEXPKV2kR/uFVEV/KVg:MB86290bLmdHDgCvcukCz8O2Y/uF2/Og
                                                                                                                                                                                          MD5:DB019451A7D678C3E7AEE706283861F6
                                                                                                                                                                                          SHA1:57E63C5372F50CBD1A7FA32688C1B77ADDCC06EB
                                                                                                                                                                                          SHA-256:B6ADC16815DC95E537548CA3572D7F93626A6D1DC390DD4CBABAB5AB855BBA30
                                                                                                                                                                                          SHA-512:6C94B2D7EFA856E6BD41FC45B0E8D16A40E61D8B895397CD71230047FAD4793DDB9ABAAC57D2841549F161C9389D7E61D54D38F1BAC6F13ED3DD4C68CDD3272C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Bogota) {.. {-9223372036854775808 -17776 0 LMT}.. {-2707671824 -17776 0 BMT}.. {-1739041424 -18000 0 -05}.. {704869200 -14400 1 -05}.. {733896000 -18000 0 -05}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8605
                                                                                                                                                                                          Entropy (8bit):3.8563913604109064
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:eSwtktXNmGaLV911sF7Lv/PCewtA8CzSPyDLbrcUia:/jXNDPlLv/PCenJzS6cy
                                                                                                                                                                                          MD5:005D0BF1320030A7E9CDC97D0C8BB44B
                                                                                                                                                                                          SHA1:CB236DA840A49B4BCD261114DCA38DADA567B091
                                                                                                                                                                                          SHA-256:93AF910CB2AD2203B71C1AD49D56DF4A4A14D07F885AFD4E755271F1372A517C
                                                                                                                                                                                          SHA-512:16A5483392741673BEC020EF6EBE963AB0FB12629D662C586C27A1E9A1BE3FEA8DC3D05A0E84917B8166E48CADA45C74DFABFDC897A6BC94D3C5058D31AD5126
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Boise) {.. {-9223372036854775808 -27889 0 LMT}.. {-2717640000 -28800 0 PST}.. {-1633269600 -25200 1 PDT}.. {-1615129200 -28800 0 PST}.. {-1601820000 -25200 1 PDT}.. {-1583679600 -28800 0 PST}.. {-1471788000 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-84380400 -21600 1 MDT}.. {-68659200 -25200 0 MST}.. {-52930800 -21600 1 MDT}.. {-37209600 -25200 0 MST}.. {-21481200 -21600 1 MDT}.. {-5760000 -25200 0 MST}.. {9968400 -21600 1 MDT}.. {25689600 -25200 0 MST}.. {41418000 -21600 1 MDT}.. {57744000 -25200 0 MST}.. {73472400 -21600 1 MDT}.. {89193600 -25200 0 MST}.. {104922000 -21600 1 MDT}.. {120643200 -25200 0 MST}.. {126255600 -25200 0 MST}.. {129114000 -21600 0 MDT}.. {152092800 -25200 0 MST}.. {162378000 -21600 1 MDT}.. {183542400 -25200 0 MST}.. {199270800 -21600 1 MDT}.. {
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):239
                                                                                                                                                                                          Entropy (8bit):4.821972751564724
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7/MQA+zAHAIgp/MQA+zE5N/290BFzk5h490/MQA+zd:MByMY/MV+zhp/MV+zE5t290rzy490/MW
                                                                                                                                                                                          MD5:6700956D5FE96CEC8D34EB49FF805374
                                                                                                                                                                                          SHA1:69B9973EF31AE204EFED7485E59CEA99E00815C8
                                                                                                                                                                                          SHA-256:DEFC5C9DA2D4D4146145A50D692A6BFF698C3B0A1F19EFD82AD0EE7678F39FCF
                                                                                                                                                                                          SHA-512:A80C03A519F00A4270248E885463090A34B3992B3DEBA94DD6AEBCC50736541655461E4AA10856125B8EF9B92CEB697429EE7088DBC6AB4FAE383FDF11521B7A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Argentina/Buenos_Aires)]} {.. LoadTimeZoneFile America/Argentina/Buenos_Aires..}..set TZData(:America/Buenos_Aires) $TZData(:America/Argentina/Buenos_Aires)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7739
                                                                                                                                                                                          Entropy (8bit):3.8713679494465016
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:zsGaLV9T1sF7Lv/PCewtA8CzSPyDLbrcUia:h5lLv/PCenJzS6cy
                                                                                                                                                                                          MD5:E6AE12CDB55FED492C253E46E2690FE0
                                                                                                                                                                                          SHA1:CD3699E50BC1694827E51E4101C713E52FA646C8
                                                                                                                                                                                          SHA-256:3E0506A54B562DBC3AA6889DDD39B327FE0B85C63B00F0B39D606921A0936A59
                                                                                                                                                                                          SHA-512:BA3D5D5420210E74E74A581C9678224948266828A8FACE06383E41E13475C682F82D288426FB915D618FFE7ED95BD8F1C7E9D59D31CE5B464D5EC1363AB5E340
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Cambridge_Bay) {.. {-9223372036854775808 0 0 -00}.. {-1577923200 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-147891600 -18000 1 MDDT}.. {-131562000 -25200 0 MST}.. {325674000 -21600 1 MDT}.. {341395200 -25200 0 MST}.. {357123600 -21600 1 MDT}.. {372844800 -25200 0 MST}.. {388573200 -21600 1 MDT}.. {404899200 -25200 0 MST}.. {420022800 -21600 1 MDT}.. {436348800 -25200 0 MST}.. {452077200 -21600 1 MDT}.. {467798400 -25200 0 MST}.. {483526800 -21600 1 MDT}.. {499248000 -25200 0 MST}.. {514976400 -21600 1 MDT}.. {530697600 -25200 0 MST}.. {544611600 -21600 1 MDT}.. {562147200 -25200 0 MST}.. {576061200 -21600 1 MDT}.. {594201600 -25200 0 MST}.. {607510800 -21600 1 MDT}.. {625651200 -25200 0 MST}.. {638960400 -21600 1 MDT}.. {657100800 -25200 0 MST}.. {671014800 -21600 1 MDT}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2918
                                                                                                                                                                                          Entropy (8bit):3.6039149423727013
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:591PSeSFESoSQSrSsCSeSPS1cSQSQlSsSyZS2SqLSwZS4vSoSUSLpSzS4X3/SxSs:5VsE3LMuJALTvn1ZdP7ZbvLfeAh+KIic
                                                                                                                                                                                          MD5:230A9F7A87BA56C30ACB3B1732F823F3
                                                                                                                                                                                          SHA1:8263EA723F2AEA7740C7EC54BE0000A06982D765
                                                                                                                                                                                          SHA-256:6D5BD1355016B03EDEA58DF98BEC26281CD372725B2DCB60B4D748D2FB4346C8
                                                                                                                                                                                          SHA-512:C357AA33833DBBDC6BC7DD3F23469EADDF08564AF17D7EE935C8AEA5F35B6E3BBDE1E181BC0DBF264051C4BE139261055633D191413DD610B0150AB3CDE161AF
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Campo_Grande) {.. {-9223372036854775808 -13108 0 LMT}.. {-1767212492 -14400 0 -04}.. {-1206954000 -10800 1 -04}.. {-1191358800 -14400 0 -04}.. {-1175371200 -10800 1 -04}.. {-1159822800 -14400 0 -04}.. {-633816000 -10800 1 -04}.. {-622065600 -14400 0 -04}.. {-602280000 -10800 1 -04}.. {-591829200 -14400 0 -04}.. {-570744000 -10800 1 -04}.. {-560206800 -14400 0 -04}.. {-539121600 -10800 1 -04}.. {-531349200 -14400 0 -04}.. {-191361600 -10800 1 -04}.. {-184194000 -14400 0 -04}.. {-155160000 -10800 1 -04}.. {-150066000 -14400 0 -04}.. {-128894400 -10800 1 -04}.. {-121122000 -14400 0 -04}.. {-99950400 -10800 1 -04}.. {-89586000 -14400 0 -04}.. {-68414400 -10800 1 -04}.. {-57963600 -14400 0 -04}.. {499752000 -10800 1 -04}.. {511239600 -14400 0 -04}.. {530596800 -10800 1 -04}.. {540270000 -14400 0 -04}.. {562132800 -10800 1 -04}.. {571201
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1412
                                                                                                                                                                                          Entropy (8bit):4.034087321254386
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5s5edTS/uVV3iVP/uaP/uAyAhbS+V8S+FfS+UvS+MS+FB3S+QS+rcS+kS+RS+dSB:5DziZAmELf0On9uhcinzPPoUlWQW3
                                                                                                                                                                                          MD5:7FBCA91F4B7100C4667F24A9AB263109
                                                                                                                                                                                          SHA1:163A77FF9EAC49B00B5F838DF4D47F079ECF6A83
                                                                                                                                                                                          SHA-256:FD6C370F82E5CFE374637E0E222E72570857AC3F85143BEEEF9C3D0E7A6C0D04
                                                                                                                                                                                          SHA-512:124A5D7F58B38F15A90BA48E63D1D38335371D98A2503E691EC6426EB51E87FD61CA05FCA83573DD1DC06DB9E599302C64D226D5DF13B8A62E0A6943318431BE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Cancun) {.. {-9223372036854775808 -20824 0 LMT}.. {-1514743200 -21600 0 CST}.. {377935200 -18000 0 EST}.. {828860400 -14400 1 EDT}.. {846396000 -18000 0 EST}.. {860310000 -14400 1 EDT}.. {877845600 -18000 0 EST}.. {891759600 -14400 1 EDT}.. {902041200 -18000 0 CDT}.. {909298800 -21600 0 CST}.. {923212800 -18000 1 CDT}.. {941353200 -21600 0 CST}.. {954662400 -18000 1 CDT}.. {972802800 -21600 0 CST}.. {989136000 -18000 1 CDT}.. {1001833200 -21600 0 CST}.. {1018166400 -18000 1 CDT}.. {1035702000 -21600 0 CST}.. {1049616000 -18000 1 CDT}.. {1067151600 -21600 0 CST}.. {1081065600 -18000 1 CDT}.. {1099206000 -21600 0 CST}.. {1112515200 -18000 1 CDT}.. {1130655600 -21600 0 CST}.. {1143964800 -18000 1 CDT}.. {1162105200 -21600 0 CST}.. {1175414400 -18000 1 CDT}.. {1193554800 -21600 0 CST}.. {1207468800 -18000 1 CDT}.. {1225004400 -21600 0
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):284
                                                                                                                                                                                          Entropy (8bit):4.588048586971241
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2909+ETlDm2OHXoHv8HkISlvFVFQVgVJUF/R/OXFxWnVVFQVgVVvR/e:MB86290XmdHXCvydSltvAUeFZ/O/qVva
                                                                                                                                                                                          MD5:5DDB49759D58931A06740A14F76B431C
                                                                                                                                                                                          SHA1:E9AC99265D42D140E12BB4DAAA24FABAC65E79FA
                                                                                                                                                                                          SHA-256:D558C25F165E956E980AA8F554AB3BF24E91B51EADBD2B1065EF6DFDA0E2F984
                                                                                                                                                                                          SHA-512:318804ED41F36A3A8746C8CD286116787A768B06CAD6057559D1C7105170DE6EAB807EFA52AA8A0E353491B6F8C47D623D4473C1AEAD20B5C00747E07BB282B2
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Caracas) {.. {-9223372036854775808 -16064 0 LMT}.. {-2524505536 -16060 0 CMT}.. {-1826739140 -16200 0 -0430}.. {-157750200 -14400 0 -04}.. {1197183600 -16200 0 -0430}.. {1462086000 -14400 0 -04}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):227
                                                                                                                                                                                          Entropy (8bit):4.666638841481612
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7/MMXAXHAIgp/MMXmRN/29094SXAFB5290/MMXAy:MByMY/MYp/MrRt290mh5290/MK
                                                                                                                                                                                          MD5:EEB851BE330BCC44A4831763534058B9
                                                                                                                                                                                          SHA1:A5FC3E69DDBD3C40D9EB4317BBD5BB6C78751B36
                                                                                                                                                                                          SHA-256:37CD6BDAA6C6EEDFAC3288CA1C11F5CBBE8A17E5F2E790E7635A64B867AFBD87
                                                                                                                                                                                          SHA-512:7CD0BC822550325EB3198B4AD6CCD38938FA654A03A09C53117560D1FE3FDCD9C892D105F0D7AF44ED52DD7E0475721240D74A10C98619BE9EC4F5410B8FD87D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Argentina/Catamarca)]} {.. LoadTimeZoneFile America/Argentina/Catamarca..}..set TZData(:America/Catamarca) $TZData(:America/Argentina/Catamarca)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):185
                                                                                                                                                                                          Entropy (8bit):4.832612867310476
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/2IAcGE91INMXGm2OHEFvpoeoHsdR4FIUPvGXFkUwXvp3VVV:SlSWB9eg/2909qDm2OHEdGeoHm4vOXF6
                                                                                                                                                                                          MD5:6052E52C8E5A5F43102C47D895797A1F
                                                                                                                                                                                          SHA1:23DBD40AE96C84E44ADCD1AC33E7871D217C17BC
                                                                                                                                                                                          SHA-256:873285F3E13CB68DD28EB109ECAD8D260E11A9FF6DF6A4E8E0D4C00B0182695B
                                                                                                                                                                                          SHA-512:DDE89C70B6F24AD4F585DC5424A6D029E5C898254C9085C588AE699CED4C8316840FF7C87685D7CFAA2E689F01687985454A0C9E3886342E936C56AB688DF732
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Cayenne) {.. {-9223372036854775808 -12560 0 LMT}.. {-1846269040 -14400 0 -04}.. {-71092800 -10800 0 -03}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):185
                                                                                                                                                                                          Entropy (8bit):4.774923706273939
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0u55DyXHAIg20u5cvRL/2IAcGE91mr4IAcGEu5pvn:SlSWB9vsM3y7oDSHAIgpdN/2909Yr49F
                                                                                                                                                                                          MD5:AD6E086BEDF05A0BEB66990BD9518BEE
                                                                                                                                                                                          SHA1:FA0B7E8D6931E79092A90F7EECBA2293AE886AE3
                                                                                                                                                                                          SHA-256:C38C49AE1C3E67BD2118002DCFCC3C0EFB6892FB9B0106908A9282C414D0BF2E
                                                                                                                                                                                          SHA-512:A1E40422D15DBCB24A6FE353639A1541FAD7F394D20F8AEB32D4E39667BA264C3E815BAA703B88B90D381540168016A0641CA220BACAF05E80EAA698642B6FFA
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Panama)]} {.. LoadTimeZoneFile America/Panama..}..set TZData(:America/Cayman) $TZData(:America/Panama)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):11372
                                                                                                                                                                                          Entropy (8bit):3.814348526052702
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:l6u30Ke1rdJ8SUklvgahLi8hbZlNA604qSScBgN+4ctDzIVQ/c/3hNxTh:l1EKwdJ8SUkl4aUqtfA604qSBgI7DBch
                                                                                                                                                                                          MD5:763E23AA7FB20F8D7CB2F0E87FAFD153
                                                                                                                                                                                          SHA1:B131A10C1C208BB5E5E178ACD21A679FD0537AC5
                                                                                                                                                                                          SHA-256:C7707AF88D650F90839E7258356E39D85228B33B6DBCC5C065C3D8733AE28CEE
                                                                                                                                                                                          SHA-512:FE9C5D2EA253338DDFD79CC8ED2F94D6817BD770C0895752EFB1917E2313735C18475D67191C29BCCD53DEFFF35C1BF0CA5D98C92091DDCD1E97CD6302DC73A4
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Chicago) {.. {-9223372036854775808 -21036 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-1577901600 -21600 0 CST}.. {-1563724800 -18000 1 CDT}.. {-1551632400 -21600 0 CST}.. {-1538928000 -18000 1 CDT}.. {-1520182800 -21600 0 CST}.. {-1504454400 -18000 1 CDT}.. {-1491757200 -21600 0 CST}.. {-1473004800 -18000 1 CDT}.. {-1459702800 -21600 0 CST}.. {-1441555200 -18000 1 CDT}.. {-1428253200 -21600 0 CST}.. {-1410105600 -18000 1 CDT}.. {-1396803600 -21600 0 CST}.. {-1378656000 -18000 1 CDT}.. {-1365354000 -21600 0 CST}.. {-1347206400 -18000 1 CDT}.. {-1333904400 -21600 0 CST}.. {-1315152000 -18000 1 CDT}.. {-1301850000 -21600 0 CST}.. {-1283702400 -18000 1 CDT}.. {-1270400400 -21600 0 CST}.. {-1252252800 -18000 1 CDT}.. {-1238950800
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):6814
                                                                                                                                                                                          Entropy (8bit):3.8786702185951305
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:bo1GK5+yBEzg4GaaECHm3FL5TInckNSNi:m5+yBEzVWEaOkv
                                                                                                                                                                                          MD5:1C8647651377A373D573DCD21001CC0A
                                                                                                                                                                                          SHA1:EFFE86F9A5C55FAB00415DD0A103B00AA6B237C6
                                                                                                                                                                                          SHA-256:A816DC1C4C2FB7509A50CB209D748DAC27C5F858A2842D7E12B2EC620FEA988B
                                                                                                                                                                                          SHA-512:5E78696E68FD13F1C45D880E49D121A7761CC5747060ADA0756D805B9DB6816DBE7054C88EC5BA0ED4C05D8EA019388195520A4B231E36F47BE99C542108481A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Chihuahua) {.. {-9223372036854775808 -25460 0 LMT}.. {-1514739600 -25200 0 MST}.. {-1343066400 -21600 0 CST}.. {-1234807200 -25200 0 MST}.. {-1220292000 -21600 0 CST}.. {-1207159200 -25200 0 MST}.. {-1191344400 -21600 0 CST}.. {820476000 -21600 0 CST}.. {828864000 -18000 1 CDT}.. {846399600 -21600 0 CST}.. {860313600 -18000 1 CDT}.. {877849200 -21600 0 CST}.. {883634400 -21600 0 CST}.. {891766800 -21600 0 MDT}.. {909302400 -25200 0 MST}.. {923216400 -21600 1 MDT}.. {941356800 -25200 0 MST}.. {954666000 -21600 1 MDT}.. {972806400 -25200 0 MST}.. {989139600 -21600 1 MDT}.. {1001836800 -25200 0 MST}.. {1018170000 -21600 1 MDT}.. {1035705600 -25200 0 MST}.. {1049619600 -21600 1 MDT}.. {1067155200 -25200 0 MST}.. {1081069200 -21600 1 MDT}.. {1099209600 -25200 0 MST}.. {1112518800 -21600 1 MDT}.. {1130659200 -25200 0 MST}.. {1143968400 -
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):192
                                                                                                                                                                                          Entropy (8bit):4.844590153688034
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0u55DyXHAIg20u5cvRL/2IAcGE9WtEaQXs+IAcGEi:SlSWB9vsM3y7oDSHAIgpdN/2909qEacn
                                                                                                                                                                                          MD5:A0BF04CD77026DC1D2749848AB0EE45E
                                                                                                                                                                                          SHA1:EA0F1BC11379DF2E421675BC5DE4805CE94B96D6
                                                                                                                                                                                          SHA-256:C8CBF5A29CC1D0827390CA6E98B2EFCF90743C6DD0ECA143B300050DD4164041
                                                                                                                                                                                          SHA-512:61968B4E42ECC60C801F959D18D13187AD39D9B81FA1A947F6B6862F99D73E3A30849AC4233DB5705D46F5373C42D8748B15BE9B82822971B4F47E601E5766D8
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Panama)]} {.. LoadTimeZoneFile America/Panama..}..set TZData(:America/Coral_Harbour) $TZData(:America/Panama)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):219
                                                                                                                                                                                          Entropy (8bit):4.78887878252354
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7/MSHAIgp/M1ovN/29093+90/M7:MByMY/M7p/M16t290c90/M7
                                                                                                                                                                                          MD5:C7CCF5CEC7AA60D6063D1C30F4263ADC
                                                                                                                                                                                          SHA1:FD8E9AEEEE50656FD3C694CA051895DDC8E5590B
                                                                                                                                                                                          SHA-256:28B84710EADEF7AD5E7FA63EF519A9D93996D3BB91DD9018333DE3AC4D8FB8DD
                                                                                                                                                                                          SHA-512:6974F8B238977EE5222368C4B79327BB240580819FCA082261D6994781144D81E2E8843B4F1C9D07EFBEE27311C8930BDAC9C0D6D6718F6FB1600D0000576CDE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Argentina/Cordoba)]} {.. LoadTimeZoneFile America/Argentina/Cordoba..}..set TZData(:America/Cordoba) $TZData(:America/Argentina/Cordoba)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):431
                                                                                                                                                                                          Entropy (8bit):4.506976345480408
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB86290lnmdHd5CvZN/Mi3yvI8/uF+wSJz/uF+IA/uF+i/X8/uF+ZDVxNv:5mnedIvZN/e5S+w+S+LS+i0S+pB
                                                                                                                                                                                          MD5:0446EF1A6985A62EDFFB9FFAC7F1DE0E
                                                                                                                                                                                          SHA1:A43468E120E585E2DCC20205BA1D1E2CCB6C0BC2
                                                                                                                                                                                          SHA-256:E3061DC6FA9F869F013351A9FDF420448592D7F959C2B4404093432508146F7E
                                                                                                                                                                                          SHA-512:86D41B0C49489572C3EAEDD5466AA92319C721CCEC9437EBB0F2AAD772FB5ED91A2F2061E00448FB48096B0BAAE9A4E1E644F8AF595B76BE05DBC0C801E6D6ED
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Costa_Rica) {.. {-9223372036854775808 -20173 0 LMT}.. {-2524501427 -20173 0 SJMT}.. {-1545071027 -21600 0 CST}.. {288770400 -18000 1 CDT}.. {297234000 -21600 0 CST}.. {320220000 -18000 1 CDT}.. {328683600 -21600 0 CST}.. {664264800 -18000 1 CDT}.. {678344400 -21600 0 CST}.. {695714400 -18000 1 CDT}.. {700635600 -21600 0 CST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):189
                                                                                                                                                                                          Entropy (8bit):4.8664633847782905
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0utLaDovXHAIg20utLRYovHRL/2IAcGE9mM7x/h4y:SlSWB9vsM3y7OBHAIgpONYyHN/2909vr
                                                                                                                                                                                          MD5:0757DD22C0E297CCE8E6678ECA4B39C7
                                                                                                                                                                                          SHA1:81B31299F9A35C8BA2EC1F59EC21129FFCDCD52F
                                                                                                                                                                                          SHA-256:A01DDB460420C8765CE8EF7A7D031ABD7BDB17CFA548E7C3B8574C388AA21E17
                                                                                                                                                                                          SHA-512:F1AFC0F6371A10E4CB74FB2C8985610AEE6C3511861BC09384EDC99D250E9099A1F4430BFC3B0B396C2702BF9991A5A4ECFD53A82C92883460715FA2C1E04579
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Phoenix)]} {.. LoadTimeZoneFile America/Phoenix..}..set TZData(:America/Creston) $TZData(:America/Phoenix)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2912
                                                                                                                                                                                          Entropy (8bit):3.588248620238414
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5tSeSFESoSQSrSsCSeSPS1cSQSQlSsSyZS2SqLSwZS4vSoSUSLpSzS4X3/SxS1S4:rVsE3LMuJALTvn1ZdP7ZbvLfeAh+KIil
                                                                                                                                                                                          MD5:264E0CEA9491B404993594E64F13479F
                                                                                                                                                                                          SHA1:6D4D277FA470A2C7AD0A59B5DA3CC15BEEB74E78
                                                                                                                                                                                          SHA-256:2D8281CF3FD9E859C5206F781E264854FA876CB36562A08C6C01343C65F8A508
                                                                                                                                                                                          SHA-512:759C19B4DD0E1F7F1176872806BFB1F17ADF9C992E41B96FEA67D77DD67E9DD3C1683E3B6D27FB092C731F534C6A7441BACFFF0301907217A064523B86992E23
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Cuiaba) {.. {-9223372036854775808 -13460 0 LMT}.. {-1767212140 -14400 0 -04}.. {-1206954000 -10800 1 -04}.. {-1191358800 -14400 0 -04}.. {-1175371200 -10800 1 -04}.. {-1159822800 -14400 0 -04}.. {-633816000 -10800 1 -04}.. {-622065600 -14400 0 -04}.. {-602280000 -10800 1 -04}.. {-591829200 -14400 0 -04}.. {-570744000 -10800 1 -04}.. {-560206800 -14400 0 -04}.. {-539121600 -10800 1 -04}.. {-531349200 -14400 0 -04}.. {-191361600 -10800 1 -04}.. {-184194000 -14400 0 -04}.. {-155160000 -10800 1 -04}.. {-150066000 -14400 0 -04}.. {-128894400 -10800 1 -04}.. {-121122000 -14400 0 -04}.. {-99950400 -10800 1 -04}.. {-89586000 -14400 0 -04}.. {-68414400 -10800 1 -04}.. {-57963600 -14400 0 -04}.. {499752000 -10800 1 -04}.. {511239600 -14400 0 -04}.. {530596800 -10800 1 -04}.. {540270000 -14400 0 -04}.. {562132800 -10800 1 -04}.. {571201200 -1
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):201
                                                                                                                                                                                          Entropy (8bit):4.876961543280111
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/2909C4e90ppv:MByMYbpwt290690b
                                                                                                                                                                                          MD5:9459043060E33E8EDC74E78332E96EDF
                                                                                                                                                                                          SHA1:27963FE063965584D0F226BAE9A08EB2954398F0
                                                                                                                                                                                          SHA-256:ACCF08CF53C9431E226714DF8BEDE3C91BAF62D5BD7B98CA8B50D7258124D129
                                                                                                                                                                                          SHA-512:215D9AFAA7227F4447177CE2ABA5A6F7F2F46A9D787845DD32F10D5C22BF9CBE4047AF5E0E66FA7A4F70EEE064A7EC7B67949E565C3C5C60C31F3C19D6915D76
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Curacao) $TZData(:America/Puerto_Rico)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1128
                                                                                                                                                                                          Entropy (8bit):3.8794180227436557
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5geNrmFQqFi77FkiVFw1ZFt9SFUXDFH9vMF0mFdS/FyMF8AWXF7HFEJF7cSXHVFS:5/vx7O11pbzvZ+S0xAqe12vey
                                                                                                                                                                                          MD5:6E37A78AC686A6B48A78541E1900E33C
                                                                                                                                                                                          SHA1:D41F39FDB6D45921B57341E95A006251B4875961
                                                                                                                                                                                          SHA-256:968C56F1D0106E1D92C7B094EEF528B6EE1FFA3D7A18BE2F2BA59178C2C0F1E0
                                                                                                                                                                                          SHA-512:397623149D95FF9A094750EE697F62DF90124BBBE407FB49FBAE335A61629449F2A61EF4471DBD57745B323DFCF3628611CAE9295F2EF7E4A7412A697651FF68
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Danmarkshavn) {.. {-9223372036854775808 -4480 0 LMT}.. {-1686091520 -10800 0 -03}.. {323845200 -7200 0 -02}.. {338950800 -10800 0 -03}.. {354675600 -7200 1 -02}.. {370400400 -10800 0 -03}.. {386125200 -7200 1 -02}.. {401850000 -10800 0 -03}.. {417574800 -7200 1 -02}.. {433299600 -10800 0 -03}.. {449024400 -7200 1 -02}.. {465354000 -10800 0 -03}.. {481078800 -7200 1 -02}.. {496803600 -10800 0 -03}.. {512528400 -7200 1 -02}.. {528253200 -10800 0 -03}.. {543978000 -7200 1 -02}.. {559702800 -10800 0 -03}.. {575427600 -7200 1 -02}.. {591152400 -10800 0 -03}.. {606877200 -7200 1 -02}.. {622602000 -10800 0 -03}.. {638326800 -7200 1 -02}.. {654656400 -10800 0 -03}.. {670381200 -7200 1 -02}.. {686106000 -10800 0 -03}.. {701830800 -7200 1 -02}.. {717555600 -10800 0 -03}.. {733280400 -7200 1 -02}.. {749005200 -10800 0 -03}.. {764730000 -72
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2967
                                                                                                                                                                                          Entropy (8bit):3.9564096415565855
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5IeVvxBn4nRfngnSSXRwEg7MkwY7Twbg7Uwr70vwHg7b6wa7gAHwc7/wzZg7ywJP:5zxKKpj/AOZFCARCeQbvb5wxMN6Ix
                                                                                                                                                                                          MD5:F494405F3B250668BE00DC3864B9A2DC
                                                                                                                                                                                          SHA1:20843AD6D95DD5D5950E2946BCAE4ECE2B676F70
                                                                                                                                                                                          SHA-256:30E875343C81C8DE473E6313A27C55315F38E7CCDBD2CEE5783EC54D269D5807
                                                                                                                                                                                          SHA-512:9102BD114436D5FE5A1942E31AE692ECE41F910AC1B6E52C02283801D5AA00CFF22D980C61E69928267D3DD34331E301C7324CA631B71AC2FBBDE06D7914F849
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Dawson) {.. {-9223372036854775808 -33460 0 LMT}.. {-2188996940 -32400 0 YST}.. {-1632056400 -28800 1 YDT}.. {-1615125600 -32400 0 YST}.. {-1596978000 -28800 1 YDT}.. {-1583164800 -32400 0 YST}.. {-880203600 -28800 1 YWT}.. {-769395600 -28800 1 YPT}.. {-765381600 -32400 0 YST}.. {-147884400 -25200 1 YDDT}.. {-131554800 -32400 0 YST}.. {315561600 -28800 0 PST}.. {325677600 -25200 1 PDT}.. {341398800 -28800 0 PST}.. {357127200 -25200 1 PDT}.. {372848400 -28800 0 PST}.. {388576800 -25200 1 PDT}.. {404902800 -28800 0 PST}.. {420026400 -25200 1 PDT}.. {436352400 -28800 0 PST}.. {452080800 -25200 1 PDT}.. {467802000 -28800 0 PST}.. {483530400 -25200 1 PDT}.. {499251600 -28800 0 PST}.. {514980000 -25200 1 PDT}.. {530701200 -28800 0 PST}.. {544615200 -25200 1 PDT}.. {562150800 -28800 0 PST}.. {576064800 -25200 1 PDT}.. {594205200 -28800 0 P
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1940
                                                                                                                                                                                          Entropy (8bit):4.024810417421672
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5/eUv5wk7Zw9JmnRsw78wP+7bw+7zwN7SynwpBZ7Fwk47H+wW73wo5775w572Iwl:5DuY/YRRvkGZ+R64CjSUlTGS
                                                                                                                                                                                          MD5:7868720D39782147B2BD6B039A5BF7E0
                                                                                                                                                                                          SHA1:6F66404E5CCFF7F020269A316D792D5E7AD4C280
                                                                                                                                                                                          SHA-256:540804BECDEAB92340EF02D32A62BFD550B71A3DB8D829BE426EE4D210004643
                                                                                                                                                                                          SHA-512:9CCD124FF954CA2988F07286FFE9ED740E0CEF5F4D76BF090367B74A577E91BF5590EDFE12AFC83ACF5CBFC88C5A68867C58082A2777D08C326A7B18889B08E2
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Dawson_Creek) {.. {-9223372036854775808 -28856 0 LMT}.. {-2713881544 -28800 0 PST}.. {-1632060000 -25200 1 PDT}.. {-1615129200 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-725817600 -28800 0 PST}.. {-715788000 -25200 1 PDT}.. {-702486000 -28800 0 PST}.. {-684338400 -25200 1 PDT}.. {-671036400 -28800 0 PST}.. {-652888800 -25200 1 PDT}.. {-639586800 -28800 0 PST}.. {-620834400 -25200 1 PDT}.. {-608137200 -28800 0 PST}.. {-589384800 -25200 1 PDT}.. {-576082800 -28800 0 PST}.. {-557935200 -25200 1 PDT}.. {-544633200 -28800 0 PST}.. {-526485600 -25200 1 PDT}.. {-513183600 -28800 0 PST}.. {-495036000 -25200 1 PDT}.. {-481734000 -28800 0 PST}.. {-463586400 -25200 1 PDT}.. {-450284400 -28800 0 PST}.. {-431532000 -25200 1 PDT}.. {-418230000 -28800 0 PST}.. {-400082400 -25200 1 PDT}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8920
                                                                                                                                                                                          Entropy (8bit):3.8540632258197514
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:gjGtwmGaLV911sF7Lv/PCewtA8CzSPyDLbrcUia:gUwDPlLv/PCenJzS6cy
                                                                                                                                                                                          MD5:0D649599A899ECB3FCF2783DCEE3E37B
                                                                                                                                                                                          SHA1:ACC796BE75F41A12FB1F8CCBD2B2839AF9876FFE
                                                                                                                                                                                          SHA-256:3FE2EE8C05C5D6F268B58BD9FC3E3A845DEA257473B29F7B3FB403E917448F3C
                                                                                                                                                                                          SHA-512:C10D41AB95439B8E978F12F9F58D1ACC9AD15404123FA5FBA0D1CC716E5CF5DA6BD2252450055AC3998DBCB8DD49F7A82ACD53413E3EE78CDA2C42F603DE2C56
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Denver) {.. {-9223372036854775808 -25196 0 LMT}.. {-2717643600 -25200 0 MST}.. {-1633273200 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1601823600 -21600 1 MDT}.. {-1583683200 -25200 0 MST}.. {-1577898000 -25200 0 MST}.. {-1570374000 -21600 1 MDT}.. {-1551628800 -25200 0 MST}.. {-1538924400 -21600 1 MDT}.. {-1534089600 -25200 0 MST}.. {-883587600 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-757357200 -25200 0 MST}.. {-147884400 -21600 1 MDT}.. {-131558400 -25200 0 MST}.. {-116434800 -21600 1 MDT}.. {-100108800 -25200 0 MST}.. {-94669200 -25200 0 MST}.. {-84380400 -21600 1 MDT}.. {-68659200 -25200 0 MST}.. {-52930800 -21600 1 MDT}.. {-37209600 -25200 0 MST}.. {-21481200 -21600 1 MDT}.. {-5760000 -25200 0 MST}.. {9968400 -21600 1 MDT}.. {25689600 -25200 0 MST}.. {41418000 -2
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8430
                                                                                                                                                                                          Entropy (8bit):3.826664943157435
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:SGiS1A5tCt/cL1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:SG/K5ItON0HY2iUmUFLqU
                                                                                                                                                                                          MD5:2BBA922E9377D257CBDF6E1367BBB1A2
                                                                                                                                                                                          SHA1:6F33A44834E8041E78660A326A5DDAF3D7F9DC2A
                                                                                                                                                                                          SHA-256:84F6897B87D3978D30D35097B78C55434CE55EB65D6E488A391DFC3B3BB5A8FE
                                                                                                                                                                                          SHA-512:D225824945C08A3521A8288B92B26DFFA712ED3505E72DEDE4A7D1777E58DEA79ADF3F042D22624E4142DD4203BAA4DFF8EB08B7033FDF00059F6C39954EA1A1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Detroit) {.. {-9223372036854775808 -19931 0 LMT}.. {-2051202469 -21600 0 CST}.. {-1724083200 -18000 0 EST}.. {-883594800 -18000 0 EST}.. {-880218000 -14400 1 EWT}.. {-769395600 -14400 1 EPT}.. {-765396000 -18000 0 EST}.. {-757364400 -18000 0 EST}.. {-684349200 -14400 1 EDT}.. {-671047200 -18000 0 EST}.. {-80506740 -14400 0 EDT}.. {-68666400 -18000 0 EST}.. {-52938000 -14400 1 EDT}.. {-37216800 -18000 0 EST}.. {-31518000 -18000 0 EST}.. {94712400 -18000 0 EST}.. {104914800 -14400 1 EDT}.. {120636000 -18000 0 EST}.. {126687600 -14400 1 EDT}.. {152085600 -18000 0 EST}.. {157784400 -18000 0 EST}.. {167814000 -14400 0 EDT}.. {183535200 -18000 0 EST}.. {199263600 -14400 1 EDT}.. {215589600 -18000 0 EST}.. {230713200 -14400 1 EDT}.. {247039200 -18000 0 EST}.. {262767600 -14400 1 EDT}.. {278488800 -18000 0 EST}.. {294217200 -14400 1 EDT}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):202
                                                                                                                                                                                          Entropy (8bit):4.86856578093135
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290TL3290ppv:MByMYbpwt290Tr290b
                                                                                                                                                                                          MD5:398D8DBB24CEA2D174EF05F63869C94A
                                                                                                                                                                                          SHA1:6D0E04165952E873E6ECA33A0E54761B747F0A98
                                                                                                                                                                                          SHA-256:3DA98AA7D3085845779BE8ED6C93CCBDA92191F17CA67BBF779803E21DA2ABF3
                                                                                                                                                                                          SHA-512:2652AFD1A3F8A4B84078A964005FE10C64491EC2D47CDE57D5066D07D1D837308FD696F53B9E7B6B0E72F86F9A85128B8CBF5F302F91EADE6D840DF946DE85CD
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Dominica) $TZData(:America/Puerto_Rico)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8600
                                                                                                                                                                                          Entropy (8bit):3.8579895970456137
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:7SabOGaLm911sF7Lv/PCewtA8CzSPyDLbrcUia:7vf4lLv/PCenJzS6cy
                                                                                                                                                                                          MD5:EBD169ECA4D45EED28BF7B27809361BC
                                                                                                                                                                                          SHA1:E89C8484A29D792FB6349CFDFDD30C2FA6B78B6B
                                                                                                                                                                                          SHA-256:026D51D73D30A3710288F440E0C337E44E3A14D0AA2D7B6C6E53AF43FC72A90C
                                                                                                                                                                                          SHA-512:45C936ED7D4AF95261180547013454AAEC9FA7672B52AC6077DD99D9FEB6DDD57652FE4EC67BF81F1588384F3027A1872E0C72D9CAEB980B66D2CB6EE9B8ABB0
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Edmonton) {.. {-9223372036854775808 -27232 0 LMT}.. {-1998663968 -25200 0 MST}.. {-1632063600 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1600614000 -21600 1 MDT}.. {-1596816000 -25200 0 MST}.. {-1567954800 -21600 1 MDT}.. {-1551628800 -25200 0 MST}.. {-1536505200 -21600 1 MDT}.. {-1523203200 -25200 0 MST}.. {-1504450800 -21600 1 MDT}.. {-1491753600 -25200 0 MST}.. {-1473001200 -21600 1 MDT}.. {-1459699200 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-715791600 -21600 1 MDT}.. {-702489600 -25200 0 MST}.. {73472400 -21600 1 MDT}.. {89193600 -25200 0 MST}.. {104922000 -21600 1 MDT}.. {120643200 -25200 0 MST}.. {136371600 -21600 1 MDT}.. {152092800 -25200 0 MST}.. {167821200 -21600 1 MDT}.. {183542400 -25200 0 MST}.. {199270800 -21600 1 MDT}.. {215596800 -25200 0 MST}.. {23072
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1230
                                                                                                                                                                                          Entropy (8bit):3.7989525000422963
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5OXUepdkZss/uuD/uVK/uNC/uvFe/uxJs/u74O/u83C/uc8J/uhF8/uNHs/ulU6w:5OXCZsMw57XJh4CxUF/A6GTrtSUUhfL0
                                                                                                                                                                                          MD5:6766E75702D8C2D1C986DFCEFCE554F9
                                                                                                                                                                                          SHA1:39553F80D82BC0134FAF70C9830B96BDCBCEFF1C
                                                                                                                                                                                          SHA-256:48FC987E5999EA79F24797E0450FE4DAB7CF320DFAD7A47A8A1E037077EC42C9
                                                                                                                                                                                          SHA-512:A812D0D4254BB0B7DB7AE116652D2A8F97D22C59F2709A17D1CE435FCFB38B807A4E0ED6EA114A66897E29D85226875FA84D28B254A5D17BD1CBA95FAD8349B7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Eirunepe) {.. {-9223372036854775808 -16768 0 LMT}.. {-1767208832 -18000 0 -05}.. {-1206950400 -14400 1 -05}.. {-1191355200 -18000 0 -05}.. {-1175367600 -14400 1 -05}.. {-1159819200 -18000 0 -05}.. {-633812400 -14400 1 -05}.. {-622062000 -18000 0 -05}.. {-602276400 -14400 1 -05}.. {-591825600 -18000 0 -05}.. {-570740400 -14400 1 -05}.. {-560203200 -18000 0 -05}.. {-539118000 -14400 1 -05}.. {-531345600 -18000 0 -05}.. {-191358000 -14400 1 -05}.. {-184190400 -18000 0 -05}.. {-155156400 -14400 1 -05}.. {-150062400 -18000 0 -05}.. {-128890800 -14400 1 -05}.. {-121118400 -18000 0 -05}.. {-99946800 -14400 1 -05}.. {-89582400 -18000 0 -05}.. {-68410800 -14400 1 -05}.. {-57960000 -18000 0 -05}.. {499755600 -14400 1 -05}.. {511243200 -18000 0 -05}.. {530600400 -14400 1 -05}.. {540273600 -18000 0 -05}.. {562136400 -14400 1 -05}.. {571204800
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):279
                                                                                                                                                                                          Entropy (8bit):4.760311149376001
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/29078iPDm2OHvJ4YoHxHhgdrV/uF+IcmJ3/uF+ivNv:MB8629078AmdHx4YCJSB/uF+QV/uF+w9
                                                                                                                                                                                          MD5:CEF7277443EB6990E72C7EA7F79A122C
                                                                                                                                                                                          SHA1:1D3FEA364B3DC129DE3998A1455D5588EBAA6FF8
                                                                                                                                                                                          SHA-256:C02C6E79398553BD07BEA0BE4B7F0EBDD8BC821595909CFFB49DE4290A0D1D0F
                                                                                                                                                                                          SHA-512:E6FC530B2CCF010B8D38BC3F49A6859B5C68F4AB604E6305CE75FBE4FC9FF3FCD0187DEBEF6DAE652EEF9695568DBDE31F426E404CC3CC206D78183E0D919234
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/El_Salvador) {.. {-9223372036854775808 -21408 0 LMT}.. {-1546279392 -21600 0 CST}.. {547020000 -18000 1 CDT}.. {559717200 -21600 0 CST}.. {578469600 -18000 1 CDT}.. {591166800 -21600 0 CST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):190
                                                                                                                                                                                          Entropy (8bit):4.836337676384058
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0qfSfXHAIg20qfORL/2IAcGE7JM7QIAcGEqfBn:SlSWB9vsM3y7ekHAIgpeON/2907390eB
                                                                                                                                                                                          MD5:005D9C0E50291616A727CFB74A9FD37E
                                                                                                                                                                                          SHA1:846AE6720382B4F67B37B4256E45246C81DAF899
                                                                                                                                                                                          SHA-256:3E363BF82545F24CCE8CFA6EEC97BA6E1C2A7730B2A9CE6C48F784821D308A5D
                                                                                                                                                                                          SHA-512:452326D11D01825764BC40A77D17444D822F3AA202582233DD8B122798478FA83E3A27A02508EAC4CF0C7922AC2563742D773AA870562AE496B34FBB41FBAD63
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Tijuana)]} {.. LoadTimeZoneFile America/Tijuana..}..set TZData(:America/Ensenada) $TZData(:America/Tijuana)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):4578
                                                                                                                                                                                          Entropy (8bit):3.8944281193962818
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5QIgsB/YRRvkGZ+R64CjSUlTG5Al5pj/A1ZFCARCeQbvb5+:6IgzR864CjSETG5sjgZkR/bvt+
                                                                                                                                                                                          MD5:4A4E023F635C4202018EA9E8F85B5047
                                                                                                                                                                                          SHA1:38E121FE2D419413E9E791B6C22BFC8D9F7554BC
                                                                                                                                                                                          SHA-256:AB15023807E7C7D1026C9970D190F1B405D48952464025242C2BB6C6BBB8391A
                                                                                                                                                                                          SHA-512:F10D21A2C841224879D1C817FC7F477DF582E1BC3603666B55199C098D51D1D5429F8C088C1083C07FC7588AE5C42A1DFBCC6B7C636AD1BE84ED657807A229E5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Fort_Nelson) {.. {-9223372036854775808 -29447 0 LMT}.. {-2713880953 -28800 0 PST}.. {-1632060000 -25200 1 PDT}.. {-1615129200 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-757353600 -28800 0 PST}.. {-725817600 -28800 0 PST}.. {-715788000 -25200 1 PDT}.. {-702486000 -28800 0 PST}.. {-684338400 -25200 1 PDT}.. {-671036400 -28800 0 PST}.. {-652888800 -25200 1 PDT}.. {-639586800 -28800 0 PST}.. {-620834400 -25200 1 PDT}.. {-608137200 -28800 0 PST}.. {-589384800 -25200 1 PDT}.. {-576082800 -28800 0 PST}.. {-557935200 -25200 1 PDT}.. {-544633200 -28800 0 PST}.. {-526485600 -25200 1 PDT}.. {-513183600 -28800 0 PST}.. {-495036000 -25200 1 PDT}.. {-481734000 -28800 0 PST}.. {-463586400 -25200 1 PDT}.. {-450284400 -28800 0 PST}.. {-431532000 -25200 1 PDT}.. {-418230000 -28800 0 PST}.. {
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):231
                                                                                                                                                                                          Entropy (8bit):4.778858143786314
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y73GK7JHAIgp3GKZRN/290HXYAp4903GK8:MByMY3GK7Kp3GKnt290Hz4903GK8
                                                                                                                                                                                          MD5:24C369A3091452DCA7AAEBF4F48F5289
                                                                                                                                                                                          SHA1:2C2174CB16F490689E6FAC17B6D18F4A0DBD2DC9
                                                                                                                                                                                          SHA-256:C8948616262CF6990739343ABBBD237E572DB49310099E21DD8F9E317F7D11B3
                                                                                                                                                                                          SHA-512:80F579572754579706B4EEA49BF30456F3231A308E0616DC430E2428A04992412773421542E4F7FE4E4C7491BA88942FA44B49E87E95A2183211AC2AB523B231
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Indiana/Indianapolis)]} {.. LoadTimeZoneFile America/Indiana/Indianapolis..}..set TZData(:America/Fort_Wayne) $TZData(:America/Indiana/Indianapolis)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1423
                                                                                                                                                                                          Entropy (8bit):3.784027854102512
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5MeajcChlrLPsw6kSS3h5R14eH8tf3GvIkuoYVZaIBXR8nd:5rChlvEw6kSSx5H4a8tf3fkuoYVZDNRo
                                                                                                                                                                                          MD5:E7939C9A3F83D73B82A6DE359365EFD4
                                                                                                                                                                                          SHA1:06D6E257DA7C317CAFAF6C0B04567A2453CC1660
                                                                                                                                                                                          SHA-256:C0A836BDAF07F0376B7B0833A0AB3D52BA6E3E1D6F95E247E1AD351CD1096066
                                                                                                                                                                                          SHA-512:E2BEA04084489B26ADD9A768D2580C1FF7EBAC8A3EA36818F49E85FB14E01500D59D53904F5A17F4DABEF27B4CC2FC3F977EE4C125E5CE739BBE90C130ED3B07
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Fortaleza) {.. {-9223372036854775808 -9240 0 LMT}.. {-1767216360 -10800 0 -03}.. {-1206957600 -7200 1 -03}.. {-1191362400 -10800 0 -03}.. {-1175374800 -7200 1 -03}.. {-1159826400 -10800 0 -03}.. {-633819600 -7200 1 -03}.. {-622069200 -10800 0 -03}.. {-602283600 -7200 1 -03}.. {-591832800 -10800 0 -03}.. {-570747600 -7200 1 -03}.. {-560210400 -10800 0 -03}.. {-539125200 -7200 1 -03}.. {-531352800 -10800 0 -03}.. {-191365200 -7200 1 -03}.. {-184197600 -10800 0 -03}.. {-155163600 -7200 1 -03}.. {-150069600 -10800 0 -03}.. {-128898000 -7200 1 -03}.. {-121125600 -10800 0 -03}.. {-99954000 -7200 1 -03}.. {-89589600 -10800 0 -03}.. {-68418000 -7200 1 -03}.. {-57967200 -10800 0 -03}.. {499748400 -7200 1 -03}.. {511236000 -10800 0 -03}.. {530593200 -7200 1 -03}.. {540266400 -10800 0 -03}.. {562129200 -7200 1 -03}.. {571197600 -10800 0 -03}.
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8372
                                                                                                                                                                                          Entropy (8bit):3.8225708746657316
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:w4lTPB10KvnpNWMPm4bPJWXtRbALtuFW4ng2CEBJuQaeEy9P19OBYEi/B51B7/BI:wKCC
                                                                                                                                                                                          MD5:1C8B0B85BB5578E84A4867546111F946
                                                                                                                                                                                          SHA1:E08A96F5B369FA53BC1F3F839EC14FF9D334F727
                                                                                                                                                                                          SHA-256:58C207CBD9DE7A7BB15E48A62CEA9F15DA184B945133DEE88EFF29FD8B66B29E
                                                                                                                                                                                          SHA-512:54CFBF208AB3E58AFB6BEC40265A452A3C4C684D7F278F51D6495FCA544652A1A5E05BC45F600911191B33C936E5D7D43A28FD2B0884AAB9F63B7AD5EFD574A1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Glace_Bay) {.. {-9223372036854775808 -14388 0 LMT}.. {-2131646412 -14400 0 AST}.. {-1632074400 -10800 1 ADT}.. {-1615143600 -14400 0 AST}.. {-880221600 -10800 1 AWT}.. {-769395600 -10800 1 APT}.. {-765399600 -14400 0 AST}.. {-536443200 -14400 0 AST}.. {-526500000 -10800 1 ADT}.. {-513198000 -14400 0 AST}.. {-504907200 -14400 0 AST}.. {63086400 -14400 0 AST}.. {73461600 -10800 1 ADT}.. {89182800 -14400 0 AST}.. {104911200 -10800 1 ADT}.. {120632400 -14400 0 AST}.. {126244800 -14400 0 AST}.. {136360800 -10800 1 ADT}.. {152082000 -14400 0 AST}.. {167810400 -10800 1 ADT}.. {183531600 -14400 0 AST}.. {199260000 -10800 1 ADT}.. {215586000 -14400 0 AST}.. {230709600 -10800 1 ADT}.. {247035600 -14400 0 AST}.. {262764000 -10800 1 ADT}.. {278485200 -14400 0 AST}.. {294213600 -10800 1 ADT}.. {309934800 -14400 0 AST}.. {325663200 -10800 1 ADT}
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):180
                                                                                                                                                                                          Entropy (8bit):4.973070790103308
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0wQbSeyXHAIg20wQboAFARL/2IAcGE5GZJ4IAcGEH:SlSWB9vsM3y7lbSeSHAIgplbLFAN/291
                                                                                                                                                                                          MD5:8263D2B39C2EC3B38A179F8BAD5972DD
                                                                                                                                                                                          SHA1:18D3462F6846768E16036E860DE90FB345C93047
                                                                                                                                                                                          SHA-256:5FB2CFBA25CE2F49D4C3911AFF8E7E1FF84EFC2D01F5783772E88246BFBC56AC
                                                                                                                                                                                          SHA-512:C175CAF972459759553001D48921268E9C6268CED56021BA6339F8CE3DD032DA6180E2B82974D3DCD0DC5F21566DFDBFBE1B6CF24E5E893F2335A449452DB27F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Nuuk)]} {.. LoadTimeZoneFile America/Nuuk..}..set TZData(:America/Godthab) $TZData(:America/Nuuk)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):10353
                                                                                                                                                                                          Entropy (8bit):3.864463676759425
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:zfSacO8f7/ewzlrfFj18KvnpNWMPm4bPJvSuYUHgA0G19OBYEi/B51B7/Bm6BTdW:zfSacOI7/V3SuYUHgAuCC
                                                                                                                                                                                          MD5:0D646C67105FD0525E7CCC79585CE9DF
                                                                                                                                                                                          SHA1:06D91FDD8FEEDC299E40079569372F97A9AC6F04
                                                                                                                                                                                          SHA-256:52D2478289682BF95BFB93D64D679E888C9D23C0F68DFFF7E6E34BFC44B3D892
                                                                                                                                                                                          SHA-512:FD672613C2B65E12425415630A2F489917EB80DDED41338C9AA7D5D3C6B54E52C516A32493593F518DACF22A91D7A9D2C96DB9C5F1BE2C3BB9842D274BDC04FF
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Goose_Bay) {.. {-9223372036854775808 -14500 0 LMT}.. {-2713895900 -12652 0 NST}.. {-1640982548 -12652 0 NST}.. {-1632076148 -9052 1 NDT}.. {-1615145348 -12652 0 NST}.. {-1609446548 -12652 0 NST}.. {-1096921748 -12600 0 NST}.. {-1072989000 -12600 0 NST}.. {-1061670600 -9000 1 NDT}.. {-1048973400 -12600 0 NST}.. {-1030221000 -9000 1 NDT}.. {-1017523800 -12600 0 NST}.. {-998771400 -9000 1 NDT}.. {-986074200 -12600 0 NST}.. {-966717000 -9000 1 NDT}.. {-954624600 -12600 0 NST}.. {-935267400 -9000 1 NDT}.. {-922570200 -12600 0 NST}.. {-903817800 -9000 1 NDT}.. {-891120600 -12600 0 NST}.. {-872368200 -9000 0 NWT}.. {-769395600 -9000 1 NPT}.. {-765401400 -12600 0 NST}.. {-757369800 -12600 0 NST}.. {-746044200 -9000 1 NDT}.. {-733347000 -12600 0 NST}.. {-714594600 -9000 1 NDT}.. {-701897400 -12600 0 NST}.. {-683145000 -9000 1 NDT}.. {-67044
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7522
                                                                                                                                                                                          Entropy (8bit):3.84007813579738
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:pGStCt/cL1BRv0HY2iU7KKdFL6Aa2K4gSLf8e:pvItOx0HY2iUmUFLqU
                                                                                                                                                                                          MD5:A17723CE27EC99D1506C45AB1531085B
                                                                                                                                                                                          SHA1:A83ED7BD09514A829CC8F2EA47BA113F5DCA1090
                                                                                                                                                                                          SHA-256:560B39485CED4C2A0E85A66EB875331E5879104187D92CB7F05C2F635E34AC99
                                                                                                                                                                                          SHA-512:110D1253D6915DB046247E4FD3BA9B881146BC3896DE779215E0CC6D1DCC59958C355441955509F5D38E3A3BA166DFD0F2F277000E9E89D6551FBEA0C16974B9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Grand_Turk) {.. {-9223372036854775808 -17072 0 LMT}.. {-2524504528 -18430 0 KMT}.. {-1827687170 -18000 0 EST}.. {284014800 -18000 0 EST}.. {294217200 -14400 1 EDT}.. {309938400 -18000 0 EST}.. {325666800 -14400 1 EDT}.. {341388000 -18000 0 EST}.. {357116400 -14400 1 EDT}.. {372837600 -18000 0 EST}.. {388566000 -14400 1 EDT}.. {404892000 -18000 0 EST}.. {420015600 -14400 1 EDT}.. {436341600 -18000 0 EST}.. {452070000 -14400 1 EDT}.. {467791200 -18000 0 EST}.. {483519600 -14400 1 EDT}.. {499240800 -18000 0 EST}.. {514969200 -14400 1 EDT}.. {530690400 -18000 0 EST}.. {544604400 -14400 1 EDT}.. {562140000 -18000 0 EST}.. {576054000 -14400 1 EDT}.. {594194400 -18000 0 EST}.. {607503600 -14400 1 EDT}.. {625644000 -18000 0 EST}.. {638953200 -14400 1 EDT}.. {657093600 -18000 0 EST}.. {671007600 -14400 1 EDT}.. {688543200 -18000 0 EST}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):201
                                                                                                                                                                                          Entropy (8bit):4.892013473075135
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/2905Qb90ppv:MByMYbpwt290Ob90b
                                                                                                                                                                                          MD5:4B9ABEA103F55509550F8B42D88E84B7
                                                                                                                                                                                          SHA1:E3AA1BCE5E260264E74F77E59C4071B7E496AB41
                                                                                                                                                                                          SHA-256:EBED070E8E67C5F12FF6E03FE508BE90789F17C793DFE61237B4045B8222580F
                                                                                                                                                                                          SHA-512:568E375464FF264C5048CB35995945BDE1D5BCC3A108B2A4D0F8389EBF18B4C58EBB1C2122F10BA777D512504A59C7EFDF6069EABD2A5DEA3189204B7F7A6EB4
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Grenada) $TZData(:America/Puerto_Rico)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):204
                                                                                                                                                                                          Entropy (8bit):4.9138787435596765
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/2905AJLr490ppv:MByMYbpwt290qJLr490b
                                                                                                                                                                                          MD5:92B091A06198E233B73DF12DFCD818D5
                                                                                                                                                                                          SHA1:C529488D09F86755E4F22CB4F0E3013C3A1B978D
                                                                                                                                                                                          SHA-256:6CB1930532831D12057FCB484C60DB64A60A4F6D8195DAFD464826923116A294
                                                                                                                                                                                          SHA-512:55EAE03CDECAC43BEDD3AA1A32C632A46808F29FF4D97A330F818544E4D10B9E9BA909D6627C38065EB7AC8E2C395FA37797F532CCFC8AB89D4698CCDE17F985
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Guadeloupe) $TZData(:America/Puerto_Rico)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):399
                                                                                                                                                                                          Entropy (8bit):4.513185345162455
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB862906GGmdHKznC972f/uF+mP/uF+K67Jqd3/uF+eBxE/uF+DAWNv:5neQCgfS+6S+K67Yd3S+e0S+1
                                                                                                                                                                                          MD5:569CDE7CE1AB84C0F16A25E85A418334
                                                                                                                                                                                          SHA1:EADE79AB6EDD98C7FE8B10B480C5C530CA014F5C
                                                                                                                                                                                          SHA-256:14F6A98D602F3648C816B110F3A0BA375E1FFE8FA06BEEAB419DC1ABFA6EDCAF
                                                                                                                                                                                          SHA-512:AE2ACBF09EED857906811BE2984D6BF92BF2955A9FE2F9F3FFEBB6790902F5C2C870F8561CA13AD9CB7826EECA434BED7CFE7D0D2739996BACEE506D0EB730DC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Guatemala) {.. {-9223372036854775808 -21724 0 LMT}.. {-1617040676 -21600 0 CST}.. {123055200 -18000 1 CDT}.. {130914000 -21600 0 CST}.. {422344800 -18000 1 CDT}.. {433054800 -21600 0 CST}.. {669708000 -18000 1 CDT}.. {684219600 -21600 0 CST}.. {1146376800 -18000 1 CDT}.. {1159678800 -21600 0 CST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):249
                                                                                                                                                                                          Entropy (8bit):4.745656594295655
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2905xDm2OHHjGeoHv5laITicKpKV0EX/uFhfF/KVg:MB86290jmdHHLCv5FT/gOR/uFpF/Og
                                                                                                                                                                                          MD5:DF661E312C6CE279CD6829120BE33CF2
                                                                                                                                                                                          SHA1:4ACDB31E27EF9175C5452BF95F94F9BC280A237F
                                                                                                                                                                                          SHA-256:6806AA5814BDC679C6EF653C518D2699114BE71D973F49C0864F622038DC2048
                                                                                                                                                                                          SHA-512:04E7FD01F4DAD981EE8A02487F4A889015C41D07D6DCF420183D387E2188FF3239E345B5D65FB195CA485F5C7B4AD8CFEF51FFFC11EE0C91F0C88FF7B7EF17C1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Guayaquil) {.. {-9223372036854775808 -19160 0 LMT}.. {-2524502440 -18840 0 QMT}.. {-1230749160 -18000 0 -05}.. {722926800 -14400 1 -05}.. {728884800 -18000 0 -05}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):248
                                                                                                                                                                                          Entropy (8bit):4.673559445766137
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2905R3SDm2OHRLx5oH8ZOXFxSyZ1yV/KMMdVVFAKFZ4KVR/ON:MB86290LGmdHBnC8ZODhyV/4d/OeZ4Ke
                                                                                                                                                                                          MD5:F06C226D8D53EF8859AD91D7EBA5959C
                                                                                                                                                                                          SHA1:E0B4E6F4ADCB10F1D79FFD928E8684FFE0C0DC5F
                                                                                                                                                                                          SHA-256:4078D2E361D04A66F22F652E3810CDF7F630CF89399B47E4EC7B1D32B400FD85
                                                                                                                                                                                          SHA-512:B4385650A0C69B7BD66415CC4BB9FCA854DBB1427E9F2D6C1D8CDB8CCEF9ECBD699C66A83A9AC289DABC5CDBB0A2B044E4097E9A2977AE1802B3BF6E2BB518CF
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Guyana) {.. {-9223372036854775808 -13959 0 LMT}.. {-1843589241 -14400 0 -04}.. {-1730577600 -13500 0 -0345}.. {176096700 -10800 0 -03}.. {701841600 -14400 0 -04}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):11124
                                                                                                                                                                                          Entropy (8bit):3.8106487461849885
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:YpQamC9XD81iWQSufutTLBCN8RWnWQ7Z/xVpmtBwXiCDLxcGMe++wzlrfFj10Kvn:2kXCvNc/1/CC
                                                                                                                                                                                          MD5:6FB9E47841FF397CE36A36C8280E2089
                                                                                                                                                                                          SHA1:DA210300DC3D94FC3D8BA0A4531341BCA5C5936C
                                                                                                                                                                                          SHA-256:01E11C7B07925D05E9E1876C310A2B87E0E80EF115D062225212E472B7A964F1
                                                                                                                                                                                          SHA-512:F61B5A8A7532BBD54A4976DF17A1C6CF51BCC6DC396482FBE169C3081AF27B6CA863F0CDE3E483C59F5A5BD3365592F6984A97173C736B41D3CEEDAD4263A4E5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Halifax) {.. {-9223372036854775808 -15264 0 LMT}.. {-2131645536 -14400 0 AST}.. {-1696276800 -10800 1 ADT}.. {-1680469200 -14400 0 AST}.. {-1640980800 -14400 0 AST}.. {-1632074400 -10800 1 ADT}.. {-1615143600 -14400 0 AST}.. {-1609444800 -14400 0 AST}.. {-1566763200 -10800 1 ADT}.. {-1557090000 -14400 0 AST}.. {-1535486400 -10800 1 ADT}.. {-1524949200 -14400 0 AST}.. {-1504468800 -10800 1 ADT}.. {-1493413200 -14400 0 AST}.. {-1472414400 -10800 1 ADT}.. {-1461963600 -14400 0 AST}.. {-1440964800 -10800 1 ADT}.. {-1429390800 -14400 0 AST}.. {-1409515200 -10800 1 ADT}.. {-1396731600 -14400 0 AST}.. {-1376856000 -10800 1 ADT}.. {-1366491600 -14400 0 AST}.. {-1346616000 -10800 1 ADT}.. {-1333832400 -14400 0 AST}.. {-1313956800 -10800 1 ADT}.. {-1303678800 -14400 0 AST}.. {-1282507200 -10800 1 ADT}.. {-1272661200 -14400 0 AST}.. {-1251057600
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8729
                                                                                                                                                                                          Entropy (8bit):3.8227313494100867
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:BEsWduCtQA/gF6Y3Umjm67yLb5RCzhV28I:BBWACb/gF6Y3UmjBy7
                                                                                                                                                                                          MD5:564980AECB32F5778422EA15E8956879
                                                                                                                                                                                          SHA1:545209C95043721C1839CCE5FEFD1A6F2DE3FE5F
                                                                                                                                                                                          SHA-256:96B62BFBF0C05CF970245597C691F89EBF631175796459642A85287F131D0215
                                                                                                                                                                                          SHA-512:25FE5DAA55E3466EAE1CDC73918F189403C3360D4E82D72D745FA04A374DE04F479AA9811D6154FC70CC8EA620F18035EA6A3074116806D4405936FA017CE8E6
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Havana) {.. {-9223372036854775808 -19768 0 LMT}.. {-2524501832 -19776 0 HMT}.. {-1402813824 -18000 0 CST}.. {-1311534000 -14400 1 CDT}.. {-1300996800 -18000 0 CST}.. {-933534000 -14400 1 CDT}.. {-925675200 -18000 0 CST}.. {-902084400 -14400 1 CDT}.. {-893620800 -18000 0 CST}.. {-870030000 -14400 1 CDT}.. {-862171200 -18000 0 CST}.. {-775681200 -14400 1 CDT}.. {-767822400 -18000 0 CST}.. {-744231600 -14400 1 CDT}.. {-736372800 -18000 0 CST}.. {-144702000 -14400 1 CDT}.. {-134251200 -18000 0 CST}.. {-113425200 -14400 1 CDT}.. {-102542400 -18000 0 CST}.. {-86295600 -14400 1 CDT}.. {-72907200 -18000 0 CST}.. {-54154800 -14400 1 CDT}.. {-41457600 -18000 0 CST}.. {-21495600 -14400 1 CDT}.. {-5774400 -18000 0 CST}.. {9954000 -14400 1 CDT}.. {25675200 -18000 0 CST}.. {41403600 -14400 1 CDT}.. {57729600 -18000 0 CST}.. {73458000 -14400 1 CD
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):616
                                                                                                                                                                                          Entropy (8bit):4.348926042114513
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB86290e2mdH5NCtXwl3UXbTMmxL+voudQCvX70qKOV9kYNv:5Ie5k9WUuwuz/Vyu
                                                                                                                                                                                          MD5:A2192F251D5A62466AF87B90E0EC5ECF
                                                                                                                                                                                          SHA1:F86DEC1E79FA877F50DAC1B06FEA870D3C9AA741
                                                                                                                                                                                          SHA-256:7391A186F8DE1FDD5A61B3887E65DCDB4A2186BFD36BBFFB464B63D9775E922A
                                                                                                                                                                                          SHA-512:AF3E5C13397C315FA7CB7EDB97510283900414A1B9A25EC9C91115D5F80267162FDD2220D8E49D57561A4B331D70706BC0A37E8BFF0D8922CD344E3A1BCCECA5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Hermosillo) {.. {-9223372036854775808 -26632 0 LMT}.. {-1514739600 -25200 0 MST}.. {-1343066400 -21600 0 CST}.. {-1234807200 -25200 0 MST}.. {-1220292000 -21600 0 CST}.. {-1207159200 -25200 0 MST}.. {-1191344400 -21600 0 CST}.. {-873828000 -25200 0 MST}.. {-661539600 -28800 0 PST}.. {28800 -25200 0 MST}.. {828867600 -21600 1 MDT}.. {846403200 -25200 0 MST}.. {860317200 -21600 1 MDT}.. {877852800 -25200 0 MST}.. {891766800 -21600 1 MDT}.. {909302400 -25200 0 MST}.. {915174000 -25200 0 MST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7230
                                                                                                                                                                                          Entropy (8bit):3.882344472808608
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:nys0KHK1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:nyBKHkN0HY2iUmUFLqU
                                                                                                                                                                                          MD5:7824B3F2D20F16A9DCC8E0F7DC45C1B8
                                                                                                                                                                                          SHA1:77014A0502DA1342EFA41B64C5613839B627354B
                                                                                                                                                                                          SHA-256:4B114545167326F066AB3A798180896B43AC6FDC3B80D32BCC917B5A4A2359EB
                                                                                                                                                                                          SHA-512:03F6A18C03E79E9177D16CD7AB75AC117197638370FA675BC2854A5A563021F865F3F0672B237B83098787AB9D419AC33D67F28324B1E25AD8560B5838F70807
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Indianapolis) {.. {-9223372036854775808 -20678 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-1577901600 -21600 0 CST}.. {-900259200 -18000 1 CDT}.. {-891795600 -21600 0 CST}.. {-883591200 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-757360800 -21600 0 CST}.. {-747244800 -18000 1 CDT}.. {-733942800 -21600 0 CST}.. {-715795200 -18000 1 CDT}.. {-702493200 -21600 0 CST}.. {-684345600 -18000 1 CDT}.. {-671043600 -21600 0 CST}.. {-652896000 -18000 1 CDT}.. {-639594000 -21600 0 CST}.. {-620841600 -18000 1 CDT}.. {-608144400 -21600 0 CST}.. {-589392000 -18000 1 CDT}.. {-576090000 -21600 0 CST}.. {-557942400 -18000 1 CDT}.. {-544640400 -21600 0 CST}.. {-526492800 -18000 1
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8755
                                                                                                                                                                                          Entropy (8bit):3.8394539560522585
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:+q2KeNrdJ8SvAgahLi8hDlNA604qSScBgN+4ctDzIVQ/c/3hNxTh:+FKUdJ8SvPaUqbA604qSBgI7DBch
                                                                                                                                                                                          MD5:8AF080A022DA0737E94742C50EAAC62E
                                                                                                                                                                                          SHA1:704F0565B53AA8A20F70B79A7958D4D07085E07A
                                                                                                                                                                                          SHA-256:F1253F5F3F5AACD1A5E1F4636DD4E083F4B2A8BD995CF3E684CDD384641849F1
                                                                                                                                                                                          SHA-512:26AAF6D24B2E2B60451E19A514533DFAEC74F01F9B1AEB9F86690669C14130D77AE1CBFB9FC9091E1CD1FC1CBC2799BB05026DB68768C3CCB960355C18D111ED
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Knox) {.. {-9223372036854775808 -20790 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-725824800 -21600 0 CST}.. {-715795200 -18000 1 CDT}.. {-702493200 -21600 0 CST}.. {-684345600 -18000 1 CDT}.. {-671043600 -21600 0 CST}.. {-652896000 -18000 1 CDT}.. {-639594000 -21600 0 CST}.. {-620841600 -18000 1 CDT}.. {-608144400 -21600 0 CST}.. {-589392000 -18000 1 CDT}.. {-576090000 -21600 0 CST}.. {-557942400 -18000 1 CDT}.. {-544640400 -21600 0 CST}.. {-526492800 -18000 1 CDT}.. {-513190800 -21600 0 CST}.. {-495043200 -18000 1 CDT}.. {-481741200 -21600 0 CST}.. {-463593600 -18000 1 CDT}.. {-447267600 -21600 0 CST}.. {-431539200 -18000 1 CDT}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7273
                                                                                                                                                                                          Entropy (8bit):3.8700915866109535
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:7qvrv7+X1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:7Kv7+bN0HY2iUmUFLqU
                                                                                                                                                                                          MD5:C1A10440E6CCE4C5052E2510182D9AA7
                                                                                                                                                                                          SHA1:56D4F3CCA1245D626BADA74CF3F6BAE8034BF58D
                                                                                                                                                                                          SHA-256:675162381639598E7100E90663D42780F8EE1CB62BD6DA5B948B494F98C02FE3
                                                                                                                                                                                          SHA-512:96B71472AD38ECFC589F935D9F5F1C8D42C8E942D8772FB6A77F9B9C0E2BD7A07FA61729E57EC02356121518E33797A784679F8DED2FCA3FC79F5C114783DD57
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Marengo) {.. {-9223372036854775808 -20723 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-599594400 -21600 0 CST}.. {-589392000 -18000 1 CDT}.. {-576090000 -21600 0 CST}.. {-495043200 -18000 1 CDT}.. {-481741200 -21600 0 CST}.. {-463593600 -18000 1 CDT}.. {-450291600 -21600 0 CST}.. {-431539200 -18000 1 CDT}.. {-418237200 -21600 0 CST}.. {-400089600 -18000 1 CDT}.. {-386787600 -21600 0 CST}.. {-368640000 -18000 1 CDT}.. {-355338000 -21600 0 CST}.. {-337190400 -18000 1 CDT}.. {-323888400 -21600 0 CST}.. {-305740800 -18000 1 CDT}.. {-292438800 -21600 0 CST}.. {-273686400 -18000 0 EST}.. {-31518000 -18000 0 EST}.. {-21488400 -14400 1 EDT}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7611
                                                                                                                                                                                          Entropy (8bit):3.87971256165061
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:TqervJ8SUklggahyBRP0HY2iU7KKdFL6Aa2K4gSLf8e:TpvJ8SUklvaQN0HY2iUmUFLqU
                                                                                                                                                                                          MD5:A86042668CD478AFFC05D3383EDEE8FF
                                                                                                                                                                                          SHA1:6476526F94A247C0ECF3B2813F2C5A4FB93E457E
                                                                                                                                                                                          SHA-256:23B8FA75CE0A9555DFD84549723A12679FF7FC5FAA58E4B745BA3C547071FF53
                                                                                                                                                                                          SHA-512:07A5487A087108E6D6E88580865885CA6243EF04BE8263FC913F38CADB8EA016386E8BBAD39F65FD081F1A2F14316FEAF008855E9CF2019B169D9511916AFF67
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Petersburg) {.. {-9223372036854775808 -20947 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-473364000 -21600 0 CST}.. {-462996000 -18000 1 CDT}.. {-450291600 -21600 0 CST}.. {-431539200 -18000 1 CDT}.. {-418237200 -21600 0 CST}.. {-400089600 -18000 1 CDT}.. {-386787600 -21600 0 CST}.. {-368640000 -18000 1 CDT}.. {-355338000 -21600 0 CST}.. {-337190400 -18000 1 CDT}.. {-323888400 -21600 0 CST}.. {-305740800 -18000 1 CDT}.. {-292438800 -21600 0 CST}.. {-273686400 -18000 1 CDT}.. {-257965200 -21600 0 CST}.. {-242236800 -18000 1 CDT}.. {-226515600 -21600 0 CST}.. {-210787200 -18000 1 CDT}.. {-195066000 -21600 0 CST}.. {-179337600 -18000 1 CD
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7100
                                                                                                                                                                                          Entropy (8bit):3.8613085681914607
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:yqxrvJ8SUklLgzNA604qSScBgN+4ctDzIVQ/c/3hNxTh:yUvJ8SUkl8BA604qSBgI7DBch
                                                                                                                                                                                          MD5:E7FE9B7CFBC6505C446056967DEBC87B
                                                                                                                                                                                          SHA1:81ADAD89F040F62E87D2F26D1D98B3E52710F695
                                                                                                                                                                                          SHA-256:D368123DB703B55244700876906775837D408C274C5A5801D80B77EADB6D5853
                                                                                                                                                                                          SHA-512:9C0746DE18C80B548AA443D59BB9971BDC304975717C5FCDEBDE72828ACF408FA1D687F87C42E7B8D6D0284C9F792EA236BF79C815947BE773D07364B630AC99
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Tell_City) {.. {-9223372036854775808 -20823 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-757360800 -21600 0 CST}.. {-462996000 -18000 1 CDT}.. {-450291600 -21600 0 CST}.. {-431539200 -18000 1 CDT}.. {-418237200 -21600 0 CST}.. {-400089600 -18000 1 CDT}.. {-386787600 -21600 0 CST}.. {-368640000 -18000 1 CDT}.. {-355338000 -21600 0 CST}.. {-337190400 -18000 1 CDT}.. {-323888400 -21600 0 CST}.. {-305740800 -18000 1 CDT}.. {-292438800 -21600 0 CST}.. {-273686400 -18000 1 CDT}.. {-257965200 -21600 0 CST}.. {-242236800 -18000 1 CDT}.. {-226515600 -21600 0 CST}.. {-210787200 -18000 1 CDT}.. {-195066000 -21600 0 CST}.. {-179337600 -18000 0 EST
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):6563
                                                                                                                                                                                          Entropy (8bit):3.866646181493734
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:juqv01BRP0HY2iU7KKdFL6Aa2K4gSLf8e:CoKN0HY2iUmUFLqU
                                                                                                                                                                                          MD5:2CCFC3980C321ED8A852759C0BCCB12C
                                                                                                                                                                                          SHA1:A8BFE02E4E71B28EF8E284E808F6EDE7C231F8FF
                                                                                                                                                                                          SHA-256:0623233AA39A1A82038A56DF255ADF49E648777375B8499491C8897EBEA1CDF1
                                                                                                                                                                                          SHA-512:A4C77689BC9BF871C756D05BAC4157F0FD324D10AC7D15F3543344C6F8C7FC9218AB7ADFBCE70C8ECCDD6EC15FD7960503FC7A8223FECE6D4227BF0BB04190C7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Vevay) {.. {-9223372036854775808 -20416 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-495043200 -18000 0 EST}.. {-31518000 -18000 0 EST}.. {-21488400 -14400 1 EDT}.. {-5767200 -18000 0 EST}.. {9961200 -14400 1 EDT}.. {25682400 -18000 0 EST}.. {41410800 -14400 1 EDT}.. {57736800 -18000 0 EST}.. {73465200 -14400 1 EDT}.. {89186400 -18000 0 EST}.. {94712400 -18000 0 EST}.. {1136091600 -18000 0 EST}.. {1143961200 -14400 1 EDT}.. {1162101600 -18000 0 EST}.. {1173596400 -14400 1 EDT}.. {1194156000 -18000 0 EST}.. {1205046000 -14400 1 EDT}.. {1225605600 -18000 0 EST}.. {1236495600 -14400 1 EDT}.. {1257055200 -18000 0 EST}.. {1268550000 -144
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7226
                                                                                                                                                                                          Entropy (8bit):3.879195938909716
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:Vq8rdJ5UklpRBRP0HY2iU7KKdFL6Aa2K4gSLf8e:VbdJ5Uklp/N0HY2iUmUFLqU
                                                                                                                                                                                          MD5:56D1930F5FAE2456DEC6C9AB1B0233E1
                                                                                                                                                                                          SHA1:F6ED52EF769DF2C015C181BCFF3DC0E24497C768
                                                                                                                                                                                          SHA-256:B8452B6AA739A78AC6D03806463B03D4175639593E19FAA3CA4B0D0FB77F18C9
                                                                                                                                                                                          SHA-512:AFCFF383DB441DA9154B639A88700D0604F487A20E830146B14061E485A991AD8DC279AF8C0C2329265CF14C901207B9058157FAA1C039082EB7630916834156
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Vincennes) {.. {-9223372036854775808 -21007 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-757360800 -21600 0 CST}.. {-747244800 -18000 1 CDT}.. {-733942800 -21600 0 CST}.. {-526492800 -18000 1 CDT}.. {-513190800 -21600 0 CST}.. {-495043200 -18000 1 CDT}.. {-481741200 -21600 0 CST}.. {-462996000 -18000 1 CDT}.. {-450291600 -21600 0 CST}.. {-431539200 -18000 1 CDT}.. {-418237200 -21600 0 CST}.. {-400089600 -18000 1 CDT}.. {-386787600 -21600 0 CST}.. {-368640000 -18000 1 CDT}.. {-355338000 -21600 0 CST}.. {-337190400 -18000 1 CDT}.. {-323888400 -21600 0 CST}.. {-305740800 -18000 1 CDT}.. {-289414800 -21600 0 CST}.. {-273686400 -18000 1 CDT
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7410
                                                                                                                                                                                          Entropy (8bit):3.8775722319777968
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:uq0KeKrv7c1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:unKxv7yN0HY2iUmUFLqU
                                                                                                                                                                                          MD5:880526DC23E7BDB00506D7EC2A885907
                                                                                                                                                                                          SHA1:DB3B13A2A4BF80E7B71C7F0604A0A80EF070B9BA
                                                                                                                                                                                          SHA-256:4B293FDB7680C4597B8C885333719214492ECF09BD5EA342D1EC15F2BF9C8605
                                                                                                                                                                                          SHA-512:42EEDC5EA28781D62A457F4843F38D0A3FEFCAD83BA01B07CEF0FA169C6440960E04BABD272C5E9AF2F4B0DBB2A786EF9221A48F084F16752E6D0EA66C31911E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Indiana/Winamac) {.. {-9223372036854775808 -20785 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-757360800 -21600 0 CST}.. {-747244800 -18000 1 CDT}.. {-733942800 -21600 0 CST}.. {-715795200 -18000 1 CDT}.. {-702493200 -21600 0 CST}.. {-684345600 -18000 1 CDT}.. {-671043600 -21600 0 CST}.. {-652896000 -18000 1 CDT}.. {-639594000 -21600 0 CST}.. {-620841600 -18000 1 CDT}.. {-608144400 -21600 0 CST}.. {-589392000 -18000 1 CDT}.. {-576090000 -21600 0 CST}.. {-557942400 -18000 1 CDT}.. {-544640400 -21600 0 CST}.. {-526492800 -18000 1 CDT}.. {-513190800 -21600 0 CST}.. {-495043200 -18000 1 CDT}.. {-481741200 -21600 0 CST}.. {-463593600 -18000 1 CDT}.
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):233
                                                                                                                                                                                          Entropy (8bit):4.7047837427916095
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y73GK7JHAIgp3GKZRN/2903GfJ4903GK8:MByMY3GK7Kp3GKnt2903GfJ4903GK8
                                                                                                                                                                                          MD5:DEE404D54FD707C4A27F464B5F19D135
                                                                                                                                                                                          SHA1:AD95D04738F6B15A93DED1DE6B5FA9F47C8E38CB
                                                                                                                                                                                          SHA-256:437DA148B94DBA4CEA402169878541DB9C3419ABAB6750D1C36625DD3053019E
                                                                                                                                                                                          SHA-512:421D6AF30F0C64EA6CB9F9DC4E7EF9E8EE5945F81A5E82A6D959D32AD69F325770DB6A07D8F52EFE7EE7F6C3AD4E1F34AA30A6B5E006C928119A54E746D6FE6B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Indiana/Indianapolis)]} {.. LoadTimeZoneFile America/Indiana/Indianapolis..}..set TZData(:America/Indianapolis) $TZData(:America/Indiana/Indianapolis)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7638
                                                                                                                                                                                          Entropy (8bit):3.8629745113156004
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:/nGaLV911sF7Lv/PCewtA8CzSPyDLbrcUia:/GPlLv/PCenJzS6cy
                                                                                                                                                                                          MD5:DBF9C2CCF786A593C9D6E4F4BB37ACE9
                                                                                                                                                                                          SHA1:4D2332A530A36E6DB2802DD9FA2DAF5C0594D5EA
                                                                                                                                                                                          SHA-256:5A1F7F5EDAD0251B73C33E7B5DDEE194646E9D3992B169DC1A64D155765D472C
                                                                                                                                                                                          SHA-512:70D75371497CED3B6C731C95299CDD5F8F49C3C6EEDDF31EB05D008769D76ACFE8BFA9A2ECE45BD0BA2E279BBEF65945955791EFC04A569F5CAA13665CD2545F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Inuvik) {.. {-9223372036854775808 0 0 -00}.. {-536457600 -28800 0 PST}.. {-147888000 -21600 1 PDDT}.. {-131558400 -28800 0 PST}.. {315558000 -25200 0 MST}.. {325674000 -21600 1 MDT}.. {341395200 -25200 0 MST}.. {357123600 -21600 1 MDT}.. {372844800 -25200 0 MST}.. {388573200 -21600 1 MDT}.. {404899200 -25200 0 MST}.. {420022800 -21600 1 MDT}.. {436348800 -25200 0 MST}.. {452077200 -21600 1 MDT}.. {467798400 -25200 0 MST}.. {483526800 -21600 1 MDT}.. {499248000 -25200 0 MST}.. {514976400 -21600 1 MDT}.. {530697600 -25200 0 MST}.. {544611600 -21600 1 MDT}.. {562147200 -25200 0 MST}.. {576061200 -21600 1 MDT}.. {594201600 -25200 0 MST}.. {607510800 -21600 1 MDT}.. {625651200 -25200 0 MST}.. {638960400 -21600 1 MDT}.. {657100800 -25200 0 MST}.. {671014800 -21600 1 MDT}.. {688550400 -25200 0 MST}.. {702464400 -21600 1 MDT}.. {7200000
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7671
                                                                                                                                                                                          Entropy (8bit):3.832645570123566
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:7FE5Ct/cQ1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:7FEct/N0HY2iUmUFLqU
                                                                                                                                                                                          MD5:8020712BBA127EA8AB52E8F5DB14286E
                                                                                                                                                                                          SHA1:DAEBC76FE10770D3FC2B5E1C14823B2B5543BA35
                                                                                                                                                                                          SHA-256:AFC4627879F4A618F5E3BA9EA123F3212E161F4CCFD0DF46F3B6B7CD2E2C0D7E
                                                                                                                                                                                          SHA-512:2F5C63F427A5DEDD5BF2B3867BE4C13774E9276C1472BF4170BCB2DA462B848CC8088743D032765133EE138388DF4217E4FC1475B12D2C8AF657A45ED6FEDE93
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Iqaluit) {.. {-9223372036854775808 0 0 -00}.. {-865296000 -14400 0 EWT}.. {-769395600 -14400 1 EPT}.. {-765396000 -18000 0 EST}.. {-147898800 -10800 1 EDDT}.. {-131569200 -18000 0 EST}.. {325666800 -14400 1 EDT}.. {341388000 -18000 0 EST}.. {357116400 -14400 1 EDT}.. {372837600 -18000 0 EST}.. {388566000 -14400 1 EDT}.. {404892000 -18000 0 EST}.. {420015600 -14400 1 EDT}.. {436341600 -18000 0 EST}.. {452070000 -14400 1 EDT}.. {467791200 -18000 0 EST}.. {483519600 -14400 1 EDT}.. {499240800 -18000 0 EST}.. {514969200 -14400 1 EDT}.. {530690400 -18000 0 EST}.. {544604400 -14400 1 EDT}.. {562140000 -18000 0 EST}.. {576054000 -14400 1 EDT}.. {594194400 -18000 0 EST}.. {607503600 -14400 1 EDT}.. {625644000 -18000 0 EST}.. {638953200 -14400 1 EDT}.. {657093600 -18000 0 EST}.. {671007600 -14400 1 EDT}.. {688543200 -18000 0 EST}.. {7024
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):847
                                                                                                                                                                                          Entropy (8bit):4.206296468996689
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5seRvZGjFS/uk1p/uue/udYR/u+zN5hi/uW9/uoUF0/u8Bb/u33RU/uMZ8/unuR3:5jUjFo1pFGzfAYFqB43RMER3
                                                                                                                                                                                          MD5:95B59E3EA2A270A34BDF98AA899203C8
                                                                                                                                                                                          SHA1:93599597797F4BAFE5C75179FB795058B1E3527D
                                                                                                                                                                                          SHA-256:4B9D5177CBA057CD53D53120A49B8A47ECCB00150018581A84851E9D5437D643
                                                                                                                                                                                          SHA-512:032BC07F9E92B756A0732AECC2DFEC4C89A58B3D6D3CA57A0F99F2AD1D51676804C7B6CE50EB3B37BB8A1EF382168AC83989D609D37C57308E29B51F1FDEFB1E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Jamaica) {.. {-9223372036854775808 -18430 0 LMT}.. {-2524503170 -18430 0 KMT}.. {-1827687170 -18000 0 EST}.. {126248400 -18000 0 EST}.. {126687600 -14400 1 EDT}.. {152085600 -18000 0 EST}.. {162370800 -14400 1 EDT}.. {183535200 -18000 0 EST}.. {199263600 -14400 1 EDT}.. {215589600 -18000 0 EST}.. {230713200 -14400 1 EDT}.. {247039200 -18000 0 EST}.. {262767600 -14400 1 EDT}.. {278488800 -18000 0 EST}.. {294217200 -14400 1 EDT}.. {309938400 -18000 0 EST}.. {325666800 -14400 1 EDT}.. {341388000 -18000 0 EST}.. {357116400 -14400 1 EDT}.. {372837600 -18000 0 EST}.. {388566000 -14400 1 EDT}.. {404892000 -18000 0 EST}.. {420015600 -14400 1 EDT}.. {436341600 -18000 0 EST}.. {441781200 -18000 0 EST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):211
                                                                                                                                                                                          Entropy (8bit):4.94277888588308
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7/MI6HAIgp/MIwRN/290pPGe90/MIz:MByMY/Myp/M9Rt290h390/M4
                                                                                                                                                                                          MD5:E020D4F9CB1AF91D373CD9F3C2247428
                                                                                                                                                                                          SHA1:0ADF2E9F8D9F8641E066764BA1BAF068F0332CE9
                                                                                                                                                                                          SHA-256:4A0495852CD4D0652B82FB57024645916DB8F192EEF9A82AFD580D87F4D496ED
                                                                                                                                                                                          SHA-512:03190F0E7EC35A358670B1617CB5C17EA3DD41195B2C4B748479D80ABAB4DB395293F688D94B87662D0469F6C5885CF7E7C9A995493A191905753F740DF659E1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Argentina/Jujuy)]} {.. LoadTimeZoneFile America/Argentina/Jujuy..}..set TZData(:America/Jujuy) $TZData(:America/Argentina/Jujuy)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8682
                                                                                                                                                                                          Entropy (8bit):3.9620285142779728
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:/fCG0rHPC9+j1giaJCUbtp0nFI+g/iexpCVaBnNnt61nctE1:/aG0rq9DiaJCUbPI+D/iMpCIBSuk
                                                                                                                                                                                          MD5:8160A0D27EECEF40F6F34A06D5D02BE6
                                                                                                                                                                                          SHA1:7CAA64F83BAA0C23EE05A72BB1079AA552FA2F3D
                                                                                                                                                                                          SHA-256:5FBE6A1FA2D3DFE23C7378E425F32BEBCA44735DA25EA075A7E5CE24BFD4049D
                                                                                                                                                                                          SHA-512:59B8D04595007B45E582E6D17734999074CA67A93F5DF742EFE1EB78DB8ABD359D4C3B213B678C6A46040A13AAB709A994B6A532D720D3EF6FCA2730ABF4885E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Juneau) {.. {-9223372036854775808 54139 0 LMT}.. {-3225223727 -32261 0 LMT}.. {-2188954939 -28800 0 PST}.. {-883584000 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-757353600 -28800 0 PST}.. {-31507200 -28800 0 PST}.. {-21477600 -25200 1 PDT}.. {-5756400 -28800 0 PST}.. {9972000 -25200 1 PDT}.. {25693200 -28800 0 PST}.. {41421600 -25200 1 PDT}.. {57747600 -28800 0 PST}.. {73476000 -25200 1 PDT}.. {89197200 -28800 0 PST}.. {104925600 -25200 1 PDT}.. {120646800 -28800 0 PST}.. {126698400 -25200 1 PDT}.. {152096400 -28800 0 PST}.. {162381600 -25200 1 PDT}.. {183546000 -28800 0 PST}.. {199274400 -25200 1 PDT}.. {215600400 -28800 0 PST}.. {230724000 -25200 1 PDT}.. {247050000 -28800 0 PST}.. {262778400 -25200 1 PDT}.. {278499600 -28800 0 PST}.. {294228000 -25200 1 PDT}.. {309949
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):9553
                                                                                                                                                                                          Entropy (8bit):3.853353361425414
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:tfTwKdrdJ9+StCt/cL1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:tfUKNdJ9+SItON0HY2iUmUFLqU
                                                                                                                                                                                          MD5:D721B38F1FFF1A6F5C02B72ECC06CDE5
                                                                                                                                                                                          SHA1:E70D99A9FC1DA9F30389129EE00FE20FA79D66A8
                                                                                                                                                                                          SHA-256:9EB1F2B19C44A55D6CC9FD1465BAF6535856941C067831E4B5E0494665014BF5
                                                                                                                                                                                          SHA-512:3C82A8C27026228F359FD96A4306F1BC337DE655FD1BA02C4399162E44DE59AD58CE569DA5AEA36E586C3BDEE7256420AABB84B44D277E244FE5AD771B4BE307
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Kentucky/Louisville) {.. {-9223372036854775808 -20582 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-1546279200 -21600 0 CST}.. {-1535904000 -18000 1 CDT}.. {-1525280400 -21600 0 CST}.. {-905097600 -18000 1 CDT}.. {-891795600 -21600 0 CST}.. {-883591200 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-757360800 -21600 0 CST}.. {-747251940 -18000 1 CDT}.. {-744224400 -21600 0 CST}.. {-620841600 -18000 1 CDT}.. {-608144400 -21600 0 CST}.. {-589392000 -18000 1 CDT}.. {-576090000 -21600 0 CST}.. {-557942400 -18000 1 CDT}.. {-544640400 -21600 0 CST}.. {-526492800 -18000 1 CDT}.. {-513190800 -21600 0 CST}.. {-495043200 -18000 1 CDT}.. {-481741200 -21600 0 CST}.. {-463593600 -18000
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8558
                                                                                                                                                                                          Entropy (8bit):3.869494272122571
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:4F8qMahLi8hR1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:4F8HaUqJN0HY2iUmUFLqU
                                                                                                                                                                                          MD5:AED6497590DA305D16AC034979C8B1E9
                                                                                                                                                                                          SHA1:AD6F1788310A3A5A761873FEF1A32416B7DBCA89
                                                                                                                                                                                          SHA-256:1C6C7FB0AE628EB6BB305B51859C4E5594A6B0876C386ED9C1C3355E7CB37AE1
                                                                                                                                                                                          SHA-512:58D960AB5F2D9F8E4DD0171E5E36CE2E072F74A7AFDBC43F9340BBCF0CDC0D060AC895F9FCF551F4CC7EB6DBF2E9835C8C3D58E87CA4FBC98C720F51C462EDCD
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Kentucky/Monticello) {.. {-9223372036854775808 -20364 0 LMT}.. {-2717647200 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-757360800 -21600 0 CST}.. {-63136800 -21600 0 CST}.. {-52934400 -18000 1 CDT}.. {-37213200 -21600 0 CST}.. {-21484800 -18000 1 CDT}.. {-5763600 -21600 0 CST}.. {9964800 -18000 1 CDT}.. {25686000 -21600 0 CST}.. {41414400 -18000 1 CDT}.. {57740400 -21600 0 CST}.. {73468800 -18000 1 CDT}.. {89190000 -21600 0 CST}.. {104918400 -18000 1 CDT}.. {120639600 -21600 0 CST}.. {126691200 -18000 1 CDT}.. {152089200 -21600 0 CST}.. {162374400 -18000 1 CDT}.. {183538800 -21600 0 CST}.. {199267200 -18000 1 CDT}.. {215593200 -21600 0 CST}.. {230716800 -18000
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):204
                                                                                                                                                                                          Entropy (8bit):4.8670778268802195
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y73GKaHAIgp3GKIN/2901iZ903GKT:MByMY3GKDp3GKIt290Q903GKT
                                                                                                                                                                                          MD5:50434016470AC512A8E2BEBA0BCEBC15
                                                                                                                                                                                          SHA1:F3541F6EE201FA33C66042F5C11A26434D37D42C
                                                                                                                                                                                          SHA-256:D66E77E6FF789D4D6CA13CDB204B977E1FE64BE9AFEE7B41F2C17ED8217FD025
                                                                                                                                                                                          SHA-512:EB1FF97050B7E067DCB68FF7C8F912C8A0C02144BB8E2EAA58C1136C6CC4A2B98C897DD23BB1E9C82D9AF6D028EE45227F97676CB34B6B830CDF5D707B990E57
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Indiana/Knox)]} {.. LoadTimeZoneFile America/Indiana/Knox..}..set TZData(:America/Knox_IN) $TZData(:America/Indiana/Knox)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):204
                                                                                                                                                                                          Entropy (8bit):4.9362668992592456
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/2901Qv090ppv:MByMYbpwt290ev090b
                                                                                                                                                                                          MD5:FE9CEC6C50DF451B599B98AE8A434FF7
                                                                                                                                                                                          SHA1:60F997825766662B2C5415FBE4D65CEA6D326537
                                                                                                                                                                                          SHA-256:5AF9B28C48661FDC81762D249B716BA077F0A40ECF431D34A893BB7EABA57965
                                                                                                                                                                                          SHA-512:1311605021871BAFAF321AA48B352262C6BA42149101CCD4FDD4000435B2584AC564E0F76D481BB181767C010FD922BAA4E4EBB401AC2FF27B21874D89332872
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Kralendijk) $TZData(:America/Puerto_Rico)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):218
                                                                                                                                                                                          Entropy (8bit):4.902526230255025
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/290WDm2OHphvoHvKZdcyFXmBVVON:MB86290ymdHphvCvKfcyy/ON
                                                                                                                                                                                          MD5:3BC04900A19D0152A31B353C6715A97B
                                                                                                                                                                                          SHA1:58A6D49E0B6FA00CBEAFD695D604D740AD63C54E
                                                                                                                                                                                          SHA-256:5488D98AA3C29D710C6AF92C42ACE36550A5BFF78C155CDF8769EE31F71CF033
                                                                                                                                                                                          SHA-512:65302935090F98A81443A1E1158911F57C3A1564564CD401CA72DDBF66D967DB564EF5AE8A4083D83984B9EF55AB53159010EFE2DB5D7A723F7EA61A1795322D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/La_Paz) {.. {-9223372036854775808 -16356 0 LMT}.. {-2524505244 -16356 0 CMT}.. {-1205954844 -12756 1 BST}.. {-1192307244 -14400 0 -04}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):460
                                                                                                                                                                                          Entropy (8bit):4.2444415392593875
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB86290B2mdH4VCvvCOt/Os/OCQXR/uFfC3/O3e/uFbs/OX/OqF/O+8/OOS1F5/D:59etvqOVLOR/uGD/utsg38xSP5r
                                                                                                                                                                                          MD5:5F41E848D2DDE91261F45CB577B1B0A9
                                                                                                                                                                                          SHA1:DF284499CF57479ADE5E1D3DC01D6DCCF6AFDFE1
                                                                                                                                                                                          SHA-256:6E01002F264DF9A6FC247F95399F4F42DCCC7AB890B0C259DE93DCC97DEC89CE
                                                                                                                                                                                          SHA-512:2F5472F812734E892182632B8A34A4AD7B342541D0C3F1107BD95FFBE25D9351A0CDF5F58F35A1F37365DDF8A8A5D883C89C3CC40A9AD09D54CA152DC6BE1A09
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Lima) {.. {-9223372036854775808 -18492 0 LMT}.. {-2524503108 -18516 0 LMT}.. {-1938538284 -14400 0 -05}.. {-1002052800 -18000 0 -05}.. {-986756400 -14400 1 -05}.. {-971035200 -18000 0 -05}.. {-955306800 -14400 1 -05}.. {-939585600 -18000 0 -05}.. {512712000 -18000 0 -05}.. {544248000 -18000 0 -05}.. {638942400 -18000 0 -05}.. {765172800 -18000 0 -05}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):9726
                                                                                                                                                                                          Entropy (8bit):3.8515163794355916
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:/uX68CWSgG0U9bFzN6IkWq/WHQt/RY4yP:/uX68CWSgGVbGBt/M
                                                                                                                                                                                          MD5:4D4F198238E4E76753411896239041C3
                                                                                                                                                                                          SHA1:AD41D199DF0B794B5AB7F165C8A141787FAAC9A9
                                                                                                                                                                                          SHA-256:DA3F7572F04E6AE78B8F044761E6F48D37EE259A9C1FE15A67072CC64A299FDB
                                                                                                                                                                                          SHA-512:BA39D174B73B1D4B09E8AC07291BED0B9658A4330AE50881080F0E37C35BD8A6F55C49F1D649ED1F19CE47002435D8724048759DFC813BF9C2E9B06B581486FF
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Los_Angeles) {.. {-9223372036854775808 -28378 0 LMT}.. {-2717640000 -28800 0 PST}.. {-1633269600 -25200 1 PDT}.. {-1615129200 -28800 0 PST}.. {-1601820000 -25200 1 PDT}.. {-1583679600 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-757353600 -28800 0 PST}.. {-687967140 -25200 1 PDT}.. {-662655600 -28800 0 PST}.. {-620838000 -25200 1 PDT}.. {-608137200 -28800 0 PST}.. {-589388400 -25200 1 PDT}.. {-576082800 -28800 0 PST}.. {-557938800 -25200 1 PDT}.. {-544633200 -28800 0 PST}.. {-526489200 -25200 1 PDT}.. {-513183600 -28800 0 PST}.. {-495039600 -25200 1 PDT}.. {-481734000 -28800 0 PST}.. {-463590000 -25200 1 PDT}.. {-450284400 -28800 0 PST}.. {-431535600 -25200 1 PDT}.. {-418230000 -28800 0 PST}.. {-400086000 -25200 1 PDT}.. {-386780400 -28800 0 PST}.. {-368636400 -25200 1 PDT}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):228
                                                                                                                                                                                          Entropy (8bit):4.911677030377383
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y71PiKp4o2HAIgp1PiKp4BvN/290hp4901PiKp44v:MByMYPyApPydt290P490Pyi
                                                                                                                                                                                          MD5:ACE87B25FE5604C83127A9F148A34C8C
                                                                                                                                                                                          SHA1:25C8D85B4740C53F40421D0DADCA95225EAB7829
                                                                                                                                                                                          SHA-256:F85C1253F4C1D3E85757D3DEA4FD3C61F1AA7BE6BAAE8CB8579278412905ACB2
                                                                                                                                                                                          SHA-512:AC0662B19F336474B146E06778E1FB43B941ABC8FD51BDB31B2640C94CCDFBE7659960EF4FD18329AFA7AD11316FC08D3CF33BB27931EA70AA7218667A8D0737
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Kentucky/Louisville)]} {.. LoadTimeZoneFile America/Kentucky/Louisville..}..set TZData(:America/Louisville) $TZData(:America/Kentucky/Louisville)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):207
                                                                                                                                                                                          Entropy (8bit):4.900350318979456
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290h48h490ppv:MByMYbpwt290/490b
                                                                                                                                                                                          MD5:83CE86174ADB5F276AABD26FE132BB55
                                                                                                                                                                                          SHA1:925E3F4A5DB1A2C33B3A537C8DBC9CFE309FA340
                                                                                                                                                                                          SHA-256:1E786229B84CE86DB6316B24C85F7CF4CFE66011F973053AD0E108BFCC9A9DE2
                                                                                                                                                                                          SHA-512:BA2AC5571D772B577735BC8E43FF8023228BC61A974DCCE0EAE20EC9B11FC757E56CABDAE00933A99834108114E598B7EC149BB017EB80BE18301A655F341A36
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Lower_Princes) $TZData(:America/Puerto_Rico)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1539
                                                                                                                                                                                          Entropy (8bit):3.7453889877550512
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5QChlvEw6kSSx5H4a8tf3fkuoLdNYVZDNR8nd:OIlvEwJSSxdF8tfMuoLdNYVZJR8nd
                                                                                                                                                                                          MD5:EB0EDF4E075E3CF9F8EDF2B689C2FE54
                                                                                                                                                                                          SHA1:9713D7E8AA0E7164824657D00DE6C49483D2BD19
                                                                                                                                                                                          SHA-256:F65C5957D434A87324AAD35991E7666E426A20C40432540D9A3CB1EEE9141761
                                                                                                                                                                                          SHA-512:0A0D1E4E0BD7D854E8F139E6F7A9BBC66422B73F7A6C2E1F1B6D2CA400B24B3D220AB519B6AEAA743443E9A4B748709CDF2C276BF52C5382669B12734A469125
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Maceio) {.. {-9223372036854775808 -8572 0 LMT}.. {-1767217028 -10800 0 -03}.. {-1206957600 -7200 1 -03}.. {-1191362400 -10800 0 -03}.. {-1175374800 -7200 1 -03}.. {-1159826400 -10800 0 -03}.. {-633819600 -7200 1 -03}.. {-622069200 -10800 0 -03}.. {-602283600 -7200 1 -03}.. {-591832800 -10800 0 -03}.. {-570747600 -7200 1 -03}.. {-560210400 -10800 0 -03}.. {-539125200 -7200 1 -03}.. {-531352800 -10800 0 -03}.. {-191365200 -7200 1 -03}.. {-184197600 -10800 0 -03}.. {-155163600 -7200 1 -03}.. {-150069600 -10800 0 -03}.. {-128898000 -7200 1 -03}.. {-121125600 -10800 0 -03}.. {-99954000 -7200 1 -03}.. {-89589600 -10800 0 -03}.. {-68418000 -7200 1 -03}.. {-57967200 -10800 0 -03}.. {499748400 -7200 1 -03}.. {511236000 -10800 0 -03}.. {530593200 -7200 1 -03}.. {540266400 -10800 0 -03}.. {562129200 -7200 1 -03}.. {571197600 -10800 0 -03}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):611
                                                                                                                                                                                          Entropy (8bit):4.303621439025158
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB86290znTjmdHOYCvprv5EU/dLAyW+/uF+kX8/uF+RZ//dAWcP/QAWcx/uF+rbE:5GnPeOdvhxD1pLS+S8S+RVqzo4xS+3SJ
                                                                                                                                                                                          MD5:FB09D1F064C30F9E223FA119A8875098
                                                                                                                                                                                          SHA1:C66173FEB21761AEA649301D77FBB77ACF3A6FB1
                                                                                                                                                                                          SHA-256:F0F0CCE8DE92D848A62B56EF48E01D763B80153C077230C435D464CF1733BA38
                                                                                                                                                                                          SHA-512:BC3D841FF48FD0DE7C9ABF5DAE3A42C876BD4D7FBD6684B4513EC7ECC92D938A7133BCC873AD46E453DD1863E843E5C7DD14FFDB41B593E90BEB5CD8F7E66202
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Managua) {.. {-9223372036854775808 -20708 0 LMT}.. {-2524500892 -20712 0 MMT}.. {-1121105688 -21600 0 CST}.. {105084000 -18000 0 EST}.. {161758800 -21600 0 CST}.. {290584800 -18000 1 CDT}.. {299134800 -21600 0 CST}.. {322034400 -18000 1 CDT}.. {330584400 -21600 0 CST}.. {694260000 -18000 0 EST}.. {717310800 -21600 0 CST}.. {725868000 -18000 0 EST}.. {852094800 -21600 0 CST}.. {1113112800 -18000 1 CDT}.. {1128229200 -21600 0 CST}.. {1146384000 -18000 1 CDT}.. {1159682400 -21600 0 CST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1166
                                                                                                                                                                                          Entropy (8bit):3.7842934576858482
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5GnqeKwnSRs//SFs/pS9/MHSW/WOSr/nSso/TSL/SSU/iS5X/LcSi/xScd/ZlSQz:5mSeSFESoSQSrSsCSeSPS1cSQSQlSsSQ
                                                                                                                                                                                          MD5:E42719A9B0165490BB9E0E899EFB3643
                                                                                                                                                                                          SHA1:2991D7EC31F47E32D2C8DB89A0F87D814122DD1B
                                                                                                                                                                                          SHA-256:DC54E6D4FE14458B0462FA0E15B960FD4290930ADC0D13453BF49B436ED8C143
                                                                                                                                                                                          SHA-512:F75024E27A2D679A667EA70EC948F983C7B823FDA5962DD88697D61147A6C2B1499E58BA8B01170653C4D025900491AE8E21925500DE39EACBAF883F7E62D874
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Manaus) {.. {-9223372036854775808 -14404 0 LMT}.. {-1767211196 -14400 0 -04}.. {-1206954000 -10800 1 -04}.. {-1191358800 -14400 0 -04}.. {-1175371200 -10800 1 -04}.. {-1159822800 -14400 0 -04}.. {-633816000 -10800 1 -04}.. {-622065600 -14400 0 -04}.. {-602280000 -10800 1 -04}.. {-591829200 -14400 0 -04}.. {-570744000 -10800 1 -04}.. {-560206800 -14400 0 -04}.. {-539121600 -10800 1 -04}.. {-531349200 -14400 0 -04}.. {-191361600 -10800 1 -04}.. {-184194000 -14400 0 -04}.. {-155160000 -10800 1 -04}.. {-150066000 -14400 0 -04}.. {-128894400 -10800 1 -04}.. {-121122000 -14400 0 -04}.. {-99950400 -10800 1 -04}.. {-89586000 -14400 0 -04}.. {-68414400 -10800 1 -04}.. {-57963600 -14400 0 -04}.. {499752000 -10800 1 -04}.. {511239600 -14400 0 -04}.. {530596800 -10800 1 -04}.. {540270000 -14400 0 -04}.. {562132800 -10800 1 -04}.. {571201200 -1
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):201
                                                                                                                                                                                          Entropy (8bit):4.900738604616686
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290zzJ/90ppv:MByMYbpwt290zzN90b
                                                                                                                                                                                          MD5:8C60DE8E522FE5D51EACD643FD8EA132
                                                                                                                                                                                          SHA1:2E09A71DF340ECA6F7AEBD978070D56A627049EC
                                                                                                                                                                                          SHA-256:5C26D7CE93F91CC4F5ED87E9388B1B180EF9D84681044FD23CC01A628A1284CA
                                                                                                                                                                                          SHA-512:D2D522D041AFA638542F6FF00F5F40325E3F117C5035BA71F676B4956B054542C67A753055D17E2E2EEA925F13EACC0969D01EC18E40D274D8EA408F92777EA2
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Marigot) $TZData(:America/Puerto_Rico)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):251
                                                                                                                                                                                          Entropy (8bit):4.849143012086458
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/290zlEDm2OHfueoHv9dMIqR5lRfT/VVFUFkmR/lAov:MB86290zimdHfnCv9dMIqR5lVb/uFkmD
                                                                                                                                                                                          MD5:CFE10EE56115D3A5F44E047B3661D8ED
                                                                                                                                                                                          SHA1:03F598CFC9AEDE2F588339B439B2361F2EBDE34F
                                                                                                                                                                                          SHA-256:D411FB42798E93B106275EC0E054F8F3C4E9FB49431C656448739C7F20C46EDE
                                                                                                                                                                                          SHA-512:25D6760FDF2F1B0DD91A41D29BDB7048FAE27A03F7B9D9C955ECF4C32E8402836D007B39FE62B93E7BEA017681A0C8AFC1C4CAFD823B0A6C41EDAF09DDF3435D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Martinique) {.. {-9223372036854775808 -14660 0 LMT}.. {-2524506940 -14660 0 FFMT}.. {-1851537340 -14400 0 AST}.. {323841600 -10800 1 ADT}.. {338958000 -14400 0 AST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):6745
                                                                                                                                                                                          Entropy (8bit):3.842851851460931
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:nD5NA604qSScBgN+4ctDzIVQ/c/3hNxTh:nDbA604qSBgI7DBch
                                                                                                                                                                                          MD5:2CE5A1AA4D5AEC9B94FA980FAA0222AB
                                                                                                                                                                                          SHA1:40838538813002C9E69F8FD244E77D4C22CF654F
                                                                                                                                                                                          SHA-256:6738B94878D0CF4D88206858ABA03D18B0A2DE71D8F051B7D19C2C367DD59D79
                                                                                                                                                                                          SHA-512:C6097A3EEDB0E68F3FE9E97816AF76631D0239EF843DEBA87096D8DB6B0E9787FA3820062871A9B22F58833B7B36F51F25B738AD671A21665BE49EAD71CC17F6
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Matamoros) {.. {-9223372036854775808 -24000 0 LMT}.. {-1514743200 -21600 0 CST}.. {568015200 -21600 0 CST}.. {576057600 -18000 1 CDT}.. {594198000 -21600 0 CST}.. {599637600 -21600 0 CST}.. {828864000 -18000 1 CDT}.. {846399600 -21600 0 CST}.. {860313600 -18000 1 CDT}.. {877849200 -21600 0 CST}.. {891763200 -18000 1 CDT}.. {909298800 -21600 0 CST}.. {923212800 -18000 1 CDT}.. {941353200 -21600 0 CST}.. {954662400 -18000 1 CDT}.. {972802800 -21600 0 CST}.. {989136000 -18000 1 CDT}.. {1001833200 -21600 0 CST}.. {1018166400 -18000 1 CDT}.. {1035702000 -21600 0 CST}.. {1049616000 -18000 1 CDT}.. {1067151600 -21600 0 CST}.. {1081065600 -18000 1 CDT}.. {1099206000 -21600 0 CST}.. {1112515200 -18000 1 CDT}.. {1130655600 -21600 0 CST}.. {1143964800 -18000 1 CDT}.. {1162105200 -21600 0 CST}.. {1175414400 -18000 1 CDT}.. {1193554800 -21600 0
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):6841
                                                                                                                                                                                          Entropy (8bit):3.872535525478649
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:WNG1GK5+yBEzg4GaaECHm3FL5TInckNSNi:/5+yBEzVWEaOkv
                                                                                                                                                                                          MD5:CBCB4A9A77EE76C16C8EC9DDD3231ABC
                                                                                                                                                                                          SHA1:270B2C3C8F5A2EFD47E4DFA22521E36CEFD5A774
                                                                                                                                                                                          SHA-256:F1E4E853758A3D79013D5B24AE45FDFD41A7C110949A5C5DB96CF14B479FA741
                                                                                                                                                                                          SHA-512:F64FFDA679E360E50C95DFA45CE866E51DC87B440E984CCABDD57E2C1C3F2FAD44256AE44FAA84E0F577B22CD1A80F891E14BF811D6D83ADA9B19DE32692175F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Mazatlan) {.. {-9223372036854775808 -25540 0 LMT}.. {-1514739600 -25200 0 MST}.. {-1343066400 -21600 0 CST}.. {-1234807200 -25200 0 MST}.. {-1220292000 -21600 0 CST}.. {-1207159200 -25200 0 MST}.. {-1191344400 -21600 0 CST}.. {-873828000 -25200 0 MST}.. {-661539600 -28800 0 PST}.. {28800 -25200 0 MST}.. {828867600 -21600 1 MDT}.. {846403200 -25200 0 MST}.. {860317200 -21600 1 MDT}.. {877852800 -25200 0 MST}.. {891766800 -21600 1 MDT}.. {909302400 -25200 0 MST}.. {923216400 -21600 1 MDT}.. {941356800 -25200 0 MST}.. {954666000 -21600 1 MDT}.. {972806400 -25200 0 MST}.. {989139600 -21600 1 MDT}.. {1001836800 -25200 0 MST}.. {1018170000 -21600 1 MDT}.. {1035705600 -25200 0 MST}.. {1049619600 -21600 1 MDT}.. {1067155200 -25200 0 MST}.. {1081069200 -21600 1 MDT}.. {1099209600 -25200 0 MST}.. {1112518800 -21600 1 MDT}.. {1130659200 -2520
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):219
                                                                                                                                                                                          Entropy (8bit):4.812188311941308
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7/MeHAIgp/MSvYovN/290zpH+90/MX:MByMY/M/p/MSA6t290zpe90/MX
                                                                                                                                                                                          MD5:2A3BFEEFBB684FB3B420A6B53B588BDC
                                                                                                                                                                                          SHA1:CC5C0BB90D847CCBB45688A8DA460AD575D64617
                                                                                                                                                                                          SHA-256:D6B308A1619F2DE450DACBFEF0E11B237DF7375A80C90899DD02B827688CB4B8
                                                                                                                                                                                          SHA-512:4A35C80D3454E039383FFEB06DC84933B3201BE2487C42A448AF3DA5ABAEEB9882263C011CDD3194E121EC1C31FC80120BF7829F280A79996E376CFA828EE215
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Argentina/Mendoza)]} {.. LoadTimeZoneFile America/Argentina/Mendoza..}..set TZData(:America/Mendoza) $TZData(:America/Argentina/Mendoza)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8410
                                                                                                                                                                                          Entropy (8bit):3.8311875423131534
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:6quShLi8hbZlNA604qSScBgN+4ctDzIVQ/c/3hNxTh:6lSUqtfA604qSBgI7DBch
                                                                                                                                                                                          MD5:C74D31382279219F805D2B138C58FBF7
                                                                                                                                                                                          SHA1:06E2FED0A3BDF62F3D390A4054B6A2D7C1863DD3
                                                                                                                                                                                          SHA-256:B0863F8B66F0848020651B69E7997307D62209259AE653FDC1A0FAFC8E793068
                                                                                                                                                                                          SHA-512:7B42CBDC119651E2B2EE8B8F934801D3147A8B72EE060A0D0EA1C0C12CA9ABD03F1A102A85BF8E7424B45620151CE107D16A9173F4AA7597EDB3109840C1B2AE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Menominee) {.. {-9223372036854775808 -21027 0 LMT}.. {-2659759773 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-757360800 -21600 0 CST}.. {-747244800 -18000 1 CDT}.. {-733942800 -21600 0 CST}.. {-116438400 -18000 1 CDT}.. {-100112400 -21600 0 CST}.. {-21484800 -18000 0 EST}.. {104914800 -21600 0 CST}.. {104918400 -18000 1 CDT}.. {120639600 -21600 0 CST}.. {126691200 -18000 1 CDT}.. {152089200 -21600 0 CST}.. {162374400 -18000 1 CDT}.. {183538800 -21600 0 CST}.. {199267200 -18000 1 CDT}.. {215593200 -21600 0 CST}.. {230716800 -18000 1 CDT}.. {247042800 -21600 0 CST}.. {262771200 -18000 1 CDT}.. {278492400 -21600 0 CST}.. {294220800 -18000 1 CDT}.. {309942000 -2160
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):6651
                                                                                                                                                                                          Entropy (8bit):3.8421369120684714
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5bu36fELf0On9uhcinzPPoUlWQnH7eelN5Lh9LY5LpfLyZ3Moonskfm10qNKAqy6:1qehpYtpjyrz7nKED4KPddGEYA/Gx
                                                                                                                                                                                          MD5:BEA04423DB05D122622807857EFD2B36
                                                                                                                                                                                          SHA1:EE2A2AB89DFFFE2880801E8667AF2AD627E641EC
                                                                                                                                                                                          SHA-256:2B4FACFC69A195C646842A8B47AFE76D755CEEDAD536DEE7ECE79302BAF97223
                                                                                                                                                                                          SHA-512:D860332F4A50F886600E9DCF3F0ACA6CC6FAD1421ECCAF0E67D0CB76F5FBFA1DC0F243F0B312A3CFB0614BD76C6A76C45E5C6F582073B23FEC4B72E77950E2EC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Merida) {.. {-9223372036854775808 -21508 0 LMT}.. {-1514743200 -21600 0 CST}.. {377935200 -18000 0 EST}.. {407653200 -21600 0 CST}.. {828864000 -18000 1 CDT}.. {846399600 -21600 0 CST}.. {860313600 -18000 1 CDT}.. {877849200 -21600 0 CST}.. {891763200 -18000 1 CDT}.. {909298800 -21600 0 CST}.. {923212800 -18000 1 CDT}.. {941353200 -21600 0 CST}.. {954662400 -18000 1 CDT}.. {972802800 -21600 0 CST}.. {989136000 -18000 1 CDT}.. {1001833200 -21600 0 CST}.. {1018166400 -18000 1 CDT}.. {1035702000 -21600 0 CST}.. {1049616000 -18000 1 CDT}.. {1067151600 -21600 0 CST}.. {1081065600 -18000 1 CDT}.. {1099206000 -21600 0 CST}.. {1112515200 -18000 1 CDT}.. {1130655600 -21600 0 CST}.. {1143964800 -18000 1 CDT}.. {1162105200 -21600 0 CST}.. {1175414400 -18000 1 CDT}.. {1193554800 -21600 0 CST}.. {1207468800 -18000 1 CDT}.. {1225004400 -21600 0
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):6705
                                                                                                                                                                                          Entropy (8bit):3.985641709481311
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:4DCG0haiaJCUbtp0nFI+g/iexpCVaBnNnt61nctE1:42G0IiaJCUbPI+D/iMpCIBSuk
                                                                                                                                                                                          MD5:4999FE49C1640402CB432BC1EB667479
                                                                                                                                                                                          SHA1:2ED0044927A66856090793ED6E5FF634617C8C40
                                                                                                                                                                                          SHA-256:2574831391092AD44D7B2806EEF30D59CE3BAE872111917DD39EC51EFDD62E5F
                                                                                                                                                                                          SHA-512:39DE1D24037F3FFA3101BBAA885939074E596479F68013CDA9CE53A061EA704F63FB55C15B68B66B0E29E3F07ADC0BDC2D78A2D289277E75D2EF95F54988DB74
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Metlakatla) {.. {-9223372036854775808 54822 0 LMT}.. {-3225223727 -31578 0 LMT}.. {-2188955622 -28800 0 PST}.. {-883584000 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-757353600 -28800 0 PST}.. {-31507200 -28800 0 PST}.. {-21477600 -25200 1 PDT}.. {-5756400 -28800 0 PST}.. {9972000 -25200 1 PDT}.. {25693200 -28800 0 PST}.. {41421600 -25200 1 PDT}.. {57747600 -28800 0 PST}.. {73476000 -25200 1 PDT}.. {89197200 -28800 0 PST}.. {104925600 -25200 1 PDT}.. {120646800 -28800 0 PST}.. {126698400 -25200 1 PDT}.. {152096400 -28800 0 PST}.. {162381600 -25200 1 PDT}.. {183546000 -28800 0 PST}.. {199274400 -25200 1 PDT}.. {215600400 -28800 0 PST}.. {230724000 -25200 1 PDT}.. {247050000 -28800 0 PST}.. {262778400 -25200 1 PDT}.. {278499600 -28800 0 PST}.. {294228000 -25200 1 PDT}.. {30
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7035
                                                                                                                                                                                          Entropy (8bit):3.8457960083650584
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5CBU/UI+n36fELf5On9uhcinzPPoUlWQnH7eelN5Lh9LY5LpfLyZ3Moonskfm10B:EBNqehpYtpjyrz7nKED4KPddGEYA/Gx
                                                                                                                                                                                          MD5:8688CD1F2C071314E56666D70DAD8261
                                                                                                                                                                                          SHA1:32F9C882D148BB9568F719099B3DCE25B53FB43C
                                                                                                                                                                                          SHA-256:3458EAF721C1CDF565B5ADDB487B4F1B93FA46744E9E5FC91D74787173B233A4
                                                                                                                                                                                          SHA-512:02A110943B2458DA20BC6D2568B19819B4831DAAD6968EC9D1A523DD81D5499AB21630F865C9CF70AEBE54D39CE72A0F833B91492E694F3117E32E06432F30DB
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Mexico_City) {.. {-9223372036854775808 -23796 0 LMT}.. {-1514739600 -25200 0 MST}.. {-1343066400 -21600 0 CST}.. {-1234807200 -25200 0 MST}.. {-1220292000 -21600 0 CST}.. {-1207159200 -25200 0 MST}.. {-1191344400 -21600 0 CST}.. {-975261600 -18000 1 CDT}.. {-963169200 -21600 0 CST}.. {-917114400 -18000 1 CDT}.. {-907354800 -21600 0 CST}.. {-821901600 -18000 1 CWT}.. {-810068400 -21600 0 CST}.. {-627501600 -18000 1 CDT}.. {-612990000 -21600 0 CST}.. {828864000 -18000 1 CDT}.. {846399600 -21600 0 CST}.. {860313600 -18000 1 CDT}.. {877849200 -21600 0 CST}.. {891763200 -18000 1 CDT}.. {909298800 -21600 0 CST}.. {923212800 -18000 1 CDT}.. {941353200 -21600 0 CST}.. {954662400 -18000 1 CDT}.. {972802800 -21600 0 CST}.. {989136000 -18000 1 CDT}.. {1001836800 -21600 0 CST}.. {1014184800 -21600 0 CST}.. {1018166400 -18000 1 CDT}.. {10357020
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7080
                                                                                                                                                                                          Entropy (8bit):3.5379714312244217
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:2UViR+iORv7bw1aW5AnMyxH5e+fHbxMfOp6D7bF8qMmqyiqV1mjZe7JhlgXY7FWN:02l5qJZS
                                                                                                                                                                                          MD5:C68889AA813C399939FCFA54E9CE0DFB
                                                                                                                                                                                          SHA1:F3D58D7BEFF2D1CB94FECE00C31FEF5BDF58C231
                                                                                                                                                                                          SHA-256:1B131AC968F95652667BD7EB1F6D667C8F679B31270D82B4B4271E787386CCCA
                                                                                                                                                                                          SHA-512:EBAF8210919E34668E9DDFCB546E5A62F35954957AAE956B6302BF296C7D4CF51E1B10FB13217CB3EEB430DAC246217EB4E9250CB4109C95D8A4367457D02771
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Miquelon) {.. {-9223372036854775808 -13480 0 LMT}.. {-1850328920 -14400 0 AST}.. {326001600 -10800 0 -03}.. {536468400 -10800 0 -02}.. {544597200 -7200 1 -02}.. {562132800 -10800 0 -02}.. {576046800 -7200 1 -02}.. {594187200 -10800 0 -02}.. {607496400 -7200 1 -02}.. {625636800 -10800 0 -02}.. {638946000 -7200 1 -02}.. {657086400 -10800 0 -02}.. {671000400 -7200 1 -02}.. {688536000 -10800 0 -02}.. {702450000 -7200 1 -02}.. {719985600 -10800 0 -02}.. {733899600 -7200 1 -02}.. {752040000 -10800 0 -02}.. {765349200 -7200 1 -02}.. {783489600 -10800 0 -02}.. {796798800 -7200 1 -02}.. {814939200 -10800 0 -02}.. {828853200 -7200 1 -02}.. {846388800 -10800 0 -02}.. {860302800 -7200 1 -02}.. {877838400 -10800 0 -02}.. {891752400 -7200 1 -02}.. {909288000 -10800 0 -02}.. {923202000 -7200 1 -02}.. {941342400 -10800 0 -02}.. {954651600 -7200
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):10507
                                                                                                                                                                                          Entropy (8bit):3.8204583916930557
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:X9+FPHyXFRsivcQYM+T7Z/xVQzxmtBWIXrObx29x8sLxcGMe++wzlrfFjxKvnpNM:gF6L0d0F2TzNc/1cYUH+CC
                                                                                                                                                                                          MD5:80B88F57B837CD2478815796618A6AC6
                                                                                                                                                                                          SHA1:CC2BE0213E9F0D3B307A8311D7A1013582E8A338
                                                                                                                                                                                          SHA-256:D977D045DE5CDAEB41189B91963E03EF845CA4B45E496649B4CB541EE1B5DD22
                                                                                                                                                                                          SHA-512:9410CBD706CAABFFF88DFF75235597D844B45A061EBD796F6708D7CEAB680273571A17935B7CCFC7C466ABF293C286D0886F47880E692F74C4E8BFB41729C73C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Moncton) {.. {-9223372036854775808 -15548 0 LMT}.. {-2715882052 -18000 0 EST}.. {-2131642800 -14400 0 AST}.. {-1632074400 -10800 1 ADT}.. {-1615143600 -14400 0 AST}.. {-1167595200 -14400 0 AST}.. {-1153681200 -10800 1 ADT}.. {-1145822400 -14400 0 AST}.. {-1122231600 -10800 1 ADT}.. {-1114372800 -14400 0 AST}.. {-1090782000 -10800 1 ADT}.. {-1082923200 -14400 0 AST}.. {-1059332400 -10800 1 ADT}.. {-1051473600 -14400 0 AST}.. {-1027882800 -10800 1 ADT}.. {-1020024000 -14400 0 AST}.. {-996433200 -10800 1 ADT}.. {-988574400 -14400 0 AST}.. {-965674800 -10800 1 ADT}.. {-955396800 -14400 0 AST}.. {-934743600 -10800 1 ADT}.. {-923947200 -14400 0 AST}.. {-904503600 -10800 1 ADT}.. {-891892800 -14400 0 AST}.. {-883598400 -14400 0 AST}.. {-880221600 -10800 1 AWT}.. {-769395600 -10800 1 APT}.. {-765399600 -14400 0 AST}.. {-757368000 -14400 0 AST
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):6714
                                                                                                                                                                                          Entropy (8bit):3.843663571428462
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5JZKy36fELf0On9uhcinzPPoUlWQnH7eelN5Lh9LY5LpfLyZ3Moonskfm10qNKAO:XwDqehpYtpjyrz7nKED4KPddGEYA/Gx
                                                                                                                                                                                          MD5:7BAF644224F6045B791D64A3AA41B515
                                                                                                                                                                                          SHA1:FCB940F91B8A7AE599433460C27953890FA38F27
                                                                                                                                                                                          SHA-256:63813975BC90A2AE8A6500D7A3173A3C81C060F8B5AAA3E86D5FDC4D5F06ABD8
                                                                                                                                                                                          SHA-512:F2DD85E8F1875274A6ACD3B9F90869ABA0539CFD564DC7DEA490AE3B7DC66B83D6F76EC3F1389FD3DFC111E5A198B7AB9AEE54CCE9A3B9C6871BE0DB211FEB76
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Monterrey) {.. {-9223372036854775808 -24076 0 LMT}.. {-1514743200 -21600 0 CST}.. {568015200 -21600 0 CST}.. {576057600 -18000 1 CDT}.. {594198000 -21600 0 CST}.. {599637600 -21600 0 CST}.. {828864000 -18000 1 CDT}.. {846399600 -21600 0 CST}.. {860313600 -18000 1 CDT}.. {877849200 -21600 0 CST}.. {891763200 -18000 1 CDT}.. {909298800 -21600 0 CST}.. {923212800 -18000 1 CDT}.. {941353200 -21600 0 CST}.. {954662400 -18000 1 CDT}.. {972802800 -21600 0 CST}.. {989136000 -18000 1 CDT}.. {1001833200 -21600 0 CST}.. {1018166400 -18000 1 CDT}.. {1035702000 -21600 0 CST}.. {1049616000 -18000 1 CDT}.. {1067151600 -21600 0 CST}.. {1081065600 -18000 1 CDT}.. {1099206000 -21600 0 CST}.. {1112515200 -18000 1 CDT}.. {1130655600 -21600 0 CST}.. {1143964800 -18000 1 CDT}.. {1162105200 -21600 0 CST}.. {1175414400 -18000 1 CDT}.. {1193554800 -21600 0
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2936
                                                                                                                                                                                          Entropy (8bit):3.6410670126139046
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5JgQkS4SaEcSyS0sZSUS2kSVSXSulSASX5kAXJMsCXrUari3akaWCa3M+lafpI6L:X5kH4c9GT0E01jm5keJMRXrUEi3akaWO
                                                                                                                                                                                          MD5:D78DEBC7C0B15B31635DDC34C49248BC
                                                                                                                                                                                          SHA1:DB2FF76DB3A79BE52E2DFD4C7B8B6592946772F9
                                                                                                                                                                                          SHA-256:214F97A3BCB2378CCE23D280EA6A3B691604F82E383628F666BE585BB8494932
                                                                                                                                                                                          SHA-512:E5FCD0B54F61910E70B1D0EE9911C5B4AFF850F16B651A01D69A63A97880913B0BAB99B0D864C4E613594734FA72CCA0E9607B1ADB6E75957C790990114FD0A4
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Montevideo) {.. {-9223372036854775808 -13491 0 LMT}.. {-1942690509 -13491 0 MMT}.. {-1567455309 -14400 0 -04}.. {-1459627200 -10800 0 -0330}.. {-1443819600 -12600 0 -0330}.. {-1428006600 -10800 1 -0330}.. {-1412283600 -12600 0 -0330}.. {-1396470600 -10800 1 -0330}.. {-1380747600 -12600 0 -0330}.. {-1141590600 -10800 1 -0330}.. {-1128286800 -12600 0 -0330}.. {-1110141000 -10800 1 -0330}.. {-1096837200 -12600 0 -0330}.. {-1078691400 -10800 1 -0330}.. {-1065387600 -12600 0 -0330}.. {-1047241800 -10800 1 -0330}.. {-1033938000 -12600 0 -0330}.. {-1015187400 -10800 1 -0330}.. {-1002488400 -12600 0 -0330}.. {-983737800 -10800 1 -0330}.. {-971038800 -12600 0 -0330}.. {-954707400 -10800 1 -0330}.. {-938984400 -12600 0 -0330}.. {-920838600 -10800 1 -0330}.. {-907534800 -12600 0 -0330}.. {-896819400 -10800 1 -0330}.. {-853621200 -9000 0 -03}.. {-84
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):190
                                                                                                                                                                                          Entropy (8bit):4.748877320903638
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0qMKLRXnXHAIg20qMKLRE6RL/2IAcGEzQ21h4IAcH:SlSWB9vsM3y7RQtHAIgpRQPN/290zQgp
                                                                                                                                                                                          MD5:9130CD86BD6417DB877BF9D8F3080CE1
                                                                                                                                                                                          SHA1:76C37982C37FE54ED539AC14B5A513817E42937C
                                                                                                                                                                                          SHA-256:97F48948EF5108FE1F42D548EA47C88D4B51BF1896EE92634C7ED55555B06DBD
                                                                                                                                                                                          SHA-512:EE036350AF95414392BD93DFF528F67D9A93EB192A30056ECBC3D2396AB4B2938B3C096C3EC2BC739294D4C4B7261C427B0AAEB9559F5381CB7F375892781820
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Toronto)]} {.. LoadTimeZoneFile America/Toronto..}..set TZData(:America/Montreal) $TZData(:America/Toronto)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):204
                                                                                                                                                                                          Entropy (8bit):4.878534808314885
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290zQ1HK90ppv:MByMYbpwt290zQ490b
                                                                                                                                                                                          MD5:CB5988A2508285B42C2BD487B8F9D6E1
                                                                                                                                                                                          SHA1:EAD740A566245B682CE5E284D389DFAE66DF05D9
                                                                                                                                                                                          SHA-256:6C3EE46983A3DAA91C9ADF4B18D6B4B80F1505B0057569B66D5B465D4C09B9C1
                                                                                                                                                                                          SHA-512:48796213A67F0E3BC56B54CE4D8BE098E74BA5808C9A1082D9381CB729ADFA2ACB9CE9E39A3244B3901405761C97AEE28D44C3BF7239ECC71175C62E152029C4
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Montserrat) $TZData(:America/Puerto_Rico)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):188
                                                                                                                                                                                          Entropy (8bit):4.785765433607229
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0qMKLRXnXHAIg20qMKLRE6RL/2IAcGEwEzEeIAcGu:SlSWB9vsM3y7RQtHAIgpRQPN/290xzEf
                                                                                                                                                                                          MD5:F7DAD684104D917E0F29F6951EA627AC
                                                                                                                                                                                          SHA1:E57B5CA730D90C5865CF32FEC4872F71E033D21C
                                                                                                                                                                                          SHA-256:A889810B8BB42CD206D8F8961164AD03CCFBB1924D583075489F78AFA10EAF67
                                                                                                                                                                                          SHA-512:8284F2A357A32B2F5A211904F65E3B5C37B77C9BF38C85DFA0A95A73457F3076EC12F09BC767B4D0B8FC86BF69D01A17A7BF685BAB72F3E519A397D050DA0C3B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Toronto)]} {.. LoadTimeZoneFile America/Toronto..}..set TZData(:America/Nassau) $TZData(:America/Toronto)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):11373
                                                                                                                                                                                          Entropy (8bit):3.8110553140357086
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:HeohzORhK1a8phYvNoStCt/cL1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:+uORhK1a8phYloSItON0HY2iUmUFLqU
                                                                                                                                                                                          MD5:385C3BDD3E41E5E75CEF0658322B5CDE
                                                                                                                                                                                          SHA1:0334C21C8316ED2EE16FC98B1E8867D5E0916C00
                                                                                                                                                                                          SHA-256:7BA7DA179AA7DF26AC25E7ACCD9BD83784174445285A0D9CCBD7D6A9AA34F4BC
                                                                                                                                                                                          SHA-512:764B680FB8414B5AC8FB110247C19B1004A4453DD2BAC94BF3CFD80281FF3679A5B1D212238509165E022269503ED14A54B0EF73AF7014344752E6A627657D1F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/New_York) {.. {-9223372036854775808 -17762 0 LMT}.. {-2717650800 -18000 0 EST}.. {-1633280400 -14400 1 EDT}.. {-1615140000 -18000 0 EST}.. {-1601830800 -14400 1 EDT}.. {-1583690400 -18000 0 EST}.. {-1577905200 -18000 0 EST}.. {-1570381200 -14400 1 EDT}.. {-1551636000 -18000 0 EST}.. {-1536512400 -14400 1 EDT}.. {-1523210400 -18000 0 EST}.. {-1504458000 -14400 1 EDT}.. {-1491760800 -18000 0 EST}.. {-1473008400 -14400 1 EDT}.. {-1459706400 -18000 0 EST}.. {-1441558800 -14400 1 EDT}.. {-1428256800 -18000 0 EST}.. {-1410109200 -14400 1 EDT}.. {-1396807200 -18000 0 EST}.. {-1378659600 -14400 1 EDT}.. {-1365357600 -18000 0 EST}.. {-1347210000 -14400 1 EDT}.. {-1333908000 -18000 0 EST}.. {-1315155600 -14400 1 EDT}.. {-1301853600 -18000 0 EST}.. {-1283706000 -14400 1 EDT}.. {-1270404000 -18000 0 EST}.. {-1252256400 -14400 1 EDT}.. {-123895440
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8100
                                                                                                                                                                                          Entropy (8bit):3.8314265228376105
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:xhZ8gEtCt/cL1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:xAgEItON0HY2iUmUFLqU
                                                                                                                                                                                          MD5:54722EA33AAC411AA1D51D5E00423937
                                                                                                                                                                                          SHA1:C6D1E5EAC6A72CCE738E465C8AA32CC76FD1DDC7
                                                                                                                                                                                          SHA-256:BB4BA3C15C626F6F94AC026A7C3D5DFE3854B17CBFA3F540FFAFFD9D5B491083
                                                                                                                                                                                          SHA-512:E66F7C2AEFB483526A7F11292B4F5E9C972DB12BAEF42110A45C49DCA5EA1DA2482A9FACA223D9F543F5ABE92CC54311ADA1852332DB184AE49CCFCED8D9405C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Nipigon) {.. {-9223372036854775808 -21184 0 LMT}.. {-2366734016 -18000 0 EST}.. {-1632070800 -14400 1 EDT}.. {-1615140000 -18000 0 EST}.. {-923252400 -14400 1 EDT}.. {-880218000 -14400 0 EWT}.. {-769395600 -14400 1 EPT}.. {-765396000 -18000 0 EST}.. {136364400 -14400 1 EDT}.. {152085600 -18000 0 EST}.. {167814000 -14400 1 EDT}.. {183535200 -18000 0 EST}.. {199263600 -14400 1 EDT}.. {215589600 -18000 0 EST}.. {230713200 -14400 1 EDT}.. {247039200 -18000 0 EST}.. {262767600 -14400 1 EDT}.. {278488800 -18000 0 EST}.. {294217200 -14400 1 EDT}.. {309938400 -18000 0 EST}.. {325666800 -14400 1 EDT}.. {341388000 -18000 0 EST}.. {357116400 -14400 1 EDT}.. {372837600 -18000 0 EST}.. {388566000 -14400 1 EDT}.. {404892000 -18000 0 EST}.. {420015600 -14400 1 EDT}.. {436341600 -18000 0 EST}.. {452070000 -14400 1 EDT}.. {467791200 -18000 0 EST}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8680
                                                                                                                                                                                          Entropy (8bit):3.965662913874442
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:OrBvOs5vzC9+j1giaJCUbtp0nFI+g/iexpCVaBnNnt61nctE1:OrBvOsM9DiaJCUbPI+D/iMpCIBSuk
                                                                                                                                                                                          MD5:9A5F536932FED5A93E2C3DEB81960CD1
                                                                                                                                                                                          SHA1:8E78396D280DD3A9564CEFC7FB722437F3C4D003
                                                                                                                                                                                          SHA-256:8E971C9560CCE548B46626D072E62AB0F4C9682BF6A6ABFB4D0E8D63745402FE
                                                                                                                                                                                          SHA-512:60CFDBCE87F9CD7F27E071D66B97E60F62E56F413DC867BC809490B30D00045D0757710D6B5724148E2A28BD1E45FB662391820E6350D998002BF67B16776645
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Nome) {.. {-9223372036854775808 46702 0 LMT}.. {-3225223727 -39698 0 LMT}.. {-2188947502 -39600 0 NST}.. {-883573200 -39600 0 NST}.. {-880196400 -36000 1 NWT}.. {-769395600 -36000 1 NPT}.. {-765374400 -39600 0 NST}.. {-757342800 -39600 0 NST}.. {-86878800 -39600 0 BST}.. {-31496400 -39600 0 BST}.. {-21466800 -36000 1 BDT}.. {-5745600 -39600 0 BST}.. {9982800 -36000 1 BDT}.. {25704000 -39600 0 BST}.. {41432400 -36000 1 BDT}.. {57758400 -39600 0 BST}.. {73486800 -36000 1 BDT}.. {89208000 -39600 0 BST}.. {104936400 -36000 1 BDT}.. {120657600 -39600 0 BST}.. {126709200 -36000 1 BDT}.. {152107200 -39600 0 BST}.. {162392400 -36000 1 BDT}.. {183556800 -39600 0 BST}.. {199285200 -36000 1 BDT}.. {215611200 -39600 0 BST}.. {230734800 -36000 1 BDT}.. {247060800 -39600 0 BST}.. {262789200 -36000 1 BDT}.. {278510400 -39600 0 BST}.. {29423880
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1397
                                                                                                                                                                                          Entropy (8bit):3.78056049136398
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5TenykFxCFbF3YCFE2FBCFDFr9CFaFPBCFoF2CFTFKCFDuF1CF2F1CFWFhCFGF3a:5quY9EmFYBosNZNW/bWsBzgCccq7JYN9
                                                                                                                                                                                          MD5:B4F4530FCE4BF5690042A2DA40413D56
                                                                                                                                                                                          SHA1:52D5F2102485F5B326C888A287ED83CA18833BBC
                                                                                                                                                                                          SHA-256:9011C76295E6B17CC1973876B497BEE21B9E6562FB25DF66140F811A1FFA9765
                                                                                                                                                                                          SHA-512:08CAF75226D190D9FF0AA62AD84B13F1BF9047338A690847DF5B448BDB731A877F3E186298AFD704F4F4E133FF3F3128B098F9D90AE9A8E726AE52F84A7DA2E3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Noronha) {.. {-9223372036854775808 -7780 0 LMT}.. {-1767217820 -7200 0 -02}.. {-1206961200 -3600 1 -02}.. {-1191366000 -7200 0 -02}.. {-1175378400 -3600 1 -02}.. {-1159830000 -7200 0 -02}.. {-633823200 -3600 1 -02}.. {-622072800 -7200 0 -02}.. {-602287200 -3600 1 -02}.. {-591836400 -7200 0 -02}.. {-570751200 -3600 1 -02}.. {-560214000 -7200 0 -02}.. {-539128800 -3600 1 -02}.. {-531356400 -7200 0 -02}.. {-191368800 -3600 1 -02}.. {-184201200 -7200 0 -02}.. {-155167200 -3600 1 -02}.. {-150073200 -7200 0 -02}.. {-128901600 -3600 1 -02}.. {-121129200 -7200 0 -02}.. {-99957600 -3600 1 -02}.. {-89593200 -7200 0 -02}.. {-68421600 -3600 1 -02}.. {-57970800 -7200 0 -02}.. {499744800 -3600 1 -02}.. {511232400 -7200 0 -02}.. {530589600 -3600 1 -02}.. {540262800 -7200 0 -02}.. {562125600 -3600 1 -02}.. {571194000 -7200 0 -02}.. {592970400 -
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8557
                                                                                                                                                                                          Entropy (8bit):3.8810445182855253
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:WEktwmGaLV911sF9A604qSScBgN+4ctDzIVQ/c/3hNxTh:WBwDPPA604qSBgI7DBch
                                                                                                                                                                                          MD5:10AF9E9461DD03DA4F0AF0595EB36E6C
                                                                                                                                                                                          SHA1:57AC9BDE3AC665E49D9D2463A4BFA38C053A4A54
                                                                                                                                                                                          SHA-256:D0D8B108453265B60F525A4EC04DE9555087CD6AC5DDBA980B3A96CF0FCD68D1
                                                                                                                                                                                          SHA-512:B6DC7D2709A19B911E086C988DB8346F42DBF7601D9E51E3093C6AF897570E43E5F1C101FE88BC5251F3DCC3B532DB22FFE8A12A4D0151BC52AF3E6DDEA7D23A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/North_Dakota/Beulah) {.. {-9223372036854775808 -24427 0 LMT}.. {-2717643600 -25200 0 MST}.. {-1633273200 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1601823600 -21600 1 MDT}.. {-1583683200 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-84380400 -21600 1 MDT}.. {-68659200 -25200 0 MST}.. {-52930800 -21600 1 MDT}.. {-37209600 -25200 0 MST}.. {-21481200 -21600 1 MDT}.. {-5760000 -25200 0 MST}.. {9968400 -21600 1 MDT}.. {25689600 -25200 0 MST}.. {41418000 -21600 1 MDT}.. {57744000 -25200 0 MST}.. {73472400 -21600 1 MDT}.. {89193600 -25200 0 MST}.. {104922000 -21600 1 MDT}.. {120643200 -25200 0 MST}.. {126694800 -21600 1 MDT}.. {152092800 -25200 0 MST}.. {162378000 -21600 1 MDT}.. {183542400 -25200 0 MST}.. {199270800 -21600 1 MDT}.. {215596800 -25200 0 MST}.. {230720400 -21600 1
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8557
                                                                                                                                                                                          Entropy (8bit):3.867423227197841
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:ZEktwmGaLV9tZlNA604qSScBgN+4ctDzIVQ/c/3hNxTh:ZBwD6fA604qSBgI7DBch
                                                                                                                                                                                          MD5:33C03AD65753D7ADB45FC4899B504D1A
                                                                                                                                                                                          SHA1:ED719BB67A64DB49901BA38A945A6BA998646B8D
                                                                                                                                                                                          SHA-256:ABC2B6C97D9E9FBA37AC582ADBA2CE996890D090060E083405D75CDAED9EABE0
                                                                                                                                                                                          SHA-512:69592E8A370C8A5173827500CDDF8190AB44EA87CD7E0C416055CB7958B13A737801EA6B0FFE6032CB3F14F05001BF9DA83E4AEB20F385019B2985ECE7ACB40E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/North_Dakota/Center) {.. {-9223372036854775808 -24312 0 LMT}.. {-2717643600 -25200 0 MST}.. {-1633273200 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1601823600 -21600 1 MDT}.. {-1583683200 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-84380400 -21600 1 MDT}.. {-68659200 -25200 0 MST}.. {-52930800 -21600 1 MDT}.. {-37209600 -25200 0 MST}.. {-21481200 -21600 1 MDT}.. {-5760000 -25200 0 MST}.. {9968400 -21600 1 MDT}.. {25689600 -25200 0 MST}.. {41418000 -21600 1 MDT}.. {57744000 -25200 0 MST}.. {73472400 -21600 1 MDT}.. {89193600 -25200 0 MST}.. {104922000 -21600 1 MDT}.. {120643200 -25200 0 MST}.. {126694800 -21600 1 MDT}.. {152092800 -25200 0 MST}.. {162378000 -21600 1 MDT}.. {183542400 -25200 0 MST}.. {199270800 -21600 1 MDT}.. {215596800 -25200 0 MST}.. {230720400 -21600 1
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8560
                                                                                                                                                                                          Entropy (8bit):3.879452555978431
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:GEktwmGaLV9nlNA604qSScBgN+4ctDzIVQ/c/3hNxTh:GBwD2fA604qSBgI7DBch
                                                                                                                                                                                          MD5:3D3DC12209293086FD843738A4FE87FB
                                                                                                                                                                                          SHA1:8103DFA18B5F3F36AF0B53FA350E0F2D300E6289
                                                                                                                                                                                          SHA-256:8803FF7C81C933B57178B9D3C502FB4268D9AA594A3C638A7F17AF60B12D300D
                                                                                                                                                                                          SHA-512:39BB939780A71B817F82D2B7F56815D33926D150525161051A9950E5A98BA9184670AFC884A1C69D56EADBD6198E3082975448EFBA5FE8A336DB071E6BAB8EF2
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/North_Dakota/New_Salem) {.. {-9223372036854775808 -24339 0 LMT}.. {-2717643600 -25200 0 MST}.. {-1633273200 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1601823600 -21600 1 MDT}.. {-1583683200 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-84380400 -21600 1 MDT}.. {-68659200 -25200 0 MST}.. {-52930800 -21600 1 MDT}.. {-37209600 -25200 0 MST}.. {-21481200 -21600 1 MDT}.. {-5760000 -25200 0 MST}.. {9968400 -21600 1 MDT}.. {25689600 -25200 0 MST}.. {41418000 -21600 1 MDT}.. {57744000 -25200 0 MST}.. {73472400 -21600 1 MDT}.. {89193600 -25200 0 MST}.. {104922000 -21600 1 MDT}.. {120643200 -25200 0 MST}.. {126694800 -21600 1 MDT}.. {152092800 -25200 0 MST}.. {162378000 -21600 1 MDT}.. {183542400 -25200 0 MST}.. {199270800 -21600 1 MDT}.. {215596800 -25200 0 MST}.. {230720400 -2160
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7429
                                                                                                                                                                                          Entropy (8bit):3.5470060859729253
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:0ixKXpbzvZ+FxAqe12voJ0euJFNgIHc/QEeF5Z1V8tCSfifK3facfzQWWLQelXuC:0LRJq9LstgV
                                                                                                                                                                                          MD5:FC9CEA4B9654D0957F55CB0E1B25A3E7
                                                                                                                                                                                          SHA1:8BFC3E8CEC34C4087579D3DA727143E3EC045B77
                                                                                                                                                                                          SHA-256:12917DAAA60134BFE56E6979BB27B58A3F295C32BAE02B233E849BCED6B8BCA2
                                                                                                                                                                                          SHA-512:355628F2EFF86605653A1EE7D976CE8B3229A4169D35576F6007FABAB37DD280D8F296EE88BECE3D84D3A1C476F23275D1D77CAF157E9A98672CBF14801D7292
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Nuuk) {.. {-9223372036854775808 -12416 0 LMT}.. {-1686083584 -10800 0 -03}.. {323845200 -7200 0 -02}.. {338950800 -10800 0 -03}.. {354675600 -7200 1 -02}.. {370400400 -10800 0 -03}.. {386125200 -7200 1 -02}.. {401850000 -10800 0 -03}.. {417574800 -7200 1 -02}.. {433299600 -10800 0 -03}.. {449024400 -7200 1 -02}.. {465354000 -10800 0 -03}.. {481078800 -7200 1 -02}.. {496803600 -10800 0 -03}.. {512528400 -7200 1 -02}.. {528253200 -10800 0 -03}.. {543978000 -7200 1 -02}.. {559702800 -10800 0 -03}.. {575427600 -7200 1 -02}.. {591152400 -10800 0 -03}.. {606877200 -7200 1 -02}.. {622602000 -10800 0 -03}.. {638326800 -7200 1 -02}.. {654656400 -10800 0 -03}.. {670381200 -7200 1 -02}.. {686106000 -10800 0 -03}.. {701830800 -7200 1 -02}.. {717555600 -10800 0 -03}.. {733280400 -7200 1 -02}.. {749005200 -10800 0 -03}.. {764730000 -7200 1 -0
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):6843
                                                                                                                                                                                          Entropy (8bit):3.877923791759769
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5gUq33FS1YluOQiLvf3PCeq5r3xod8CzSP2IZ5Sy4DLbrc6HiviVN:So1c7Lv/PCewtA8CzSPyDLbrcUia
                                                                                                                                                                                          MD5:32BDE9C2C59F2A34D3B9F98BC9894A99
                                                                                                                                                                                          SHA1:04A24DC4A3C2A0D7C9C8E0001E320662778A78BF
                                                                                                                                                                                          SHA-256:549E92BDEC98D21C5C4A996F954671A2F0262463415BF294D122500246309BC4
                                                                                                                                                                                          SHA-512:A33E583EC5B2B274C4247C109F37F9A4495ED9094849F6A8E68145EBF6A1906B3DD0B31BB7690261FEDA9C72F2288F4D1121365F544B9EC1343E208B472D0660
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Ojinaga) {.. {-9223372036854775808 -25060 0 LMT}.. {-1514739600 -25200 0 MST}.. {-1343066400 -21600 0 CST}.. {-1234807200 -25200 0 MST}.. {-1220292000 -21600 0 CST}.. {-1207159200 -25200 0 MST}.. {-1191344400 -21600 0 CST}.. {820476000 -21600 0 CST}.. {828864000 -18000 1 CDT}.. {846399600 -21600 0 CST}.. {860313600 -18000 1 CDT}.. {877849200 -21600 0 CST}.. {883634400 -21600 0 CST}.. {891766800 -21600 0 MDT}.. {909302400 -25200 0 MST}.. {923216400 -21600 1 MDT}.. {941356800 -25200 0 MST}.. {954666000 -21600 1 MDT}.. {972806400 -25200 0 MST}.. {989139600 -21600 1 MDT}.. {1001836800 -25200 0 MST}.. {1018170000 -21600 1 MDT}.. {1035705600 -25200 0 MST}.. {1049619600 -21600 1 MDT}.. {1067155200 -25200 0 MST}.. {1081069200 -21600 1 MDT}.. {1099209600 -25200 0 MST}.. {1112518800 -21600 1 MDT}.. {1130659200 -25200 0 MST}.. {1143968400 -21
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):186
                                                                                                                                                                                          Entropy (8bit):4.970379147398626
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/2IAcGEu5YfMXGm2OHGf8xYoHv5BidhZvFsc1HRX1va0v:SlSWB9eg/290ZDm2OHDxYoHv5GhZd93p
                                                                                                                                                                                          MD5:AA408A43079EC8933DE271BE3DA2B502
                                                                                                                                                                                          SHA1:421A867DB3FD4779C5F759D0B657D8EB5FB2218B
                                                                                                                                                                                          SHA-256:990213DDE00ADCEB74C8D1ECAF81B9C77963E4AB1F35767F7349236FC8E917DF
                                                                                                                                                                                          SHA-512:1FB740527555A8E128E05709D05720A249BCBA4B6434D00226C07426E6283AA48973F75268F36E6044F0F0650E012781C8E5519B7EA916C625BBF018B29E9961
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Panama) {.. {-9223372036854775808 -19088 0 LMT}.. {-2524502512 -19176 0 CMT}.. {-1946918424 -18000 0 EST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7736
                                                                                                                                                                                          Entropy (8bit):3.8533019559841972
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:tTqPm4bPJWXtRbALtuO/N0HY2iUmUFLqU:Izod
                                                                                                                                                                                          MD5:6BA298F9CEB6406802A01C13313F8EF1
                                                                                                                                                                                          SHA1:D77C113CFA927EF65461781FD080F590C8CFCBB9
                                                                                                                                                                                          SHA-256:1FB962ECC1E5F02E1001C70460FFF720B114554F9AA7956D6DA154DBEA87B4D7
                                                                                                                                                                                          SHA-512:C7F4E2DA503A3167098CFAB7AEC8D75A32D6B081E6777DE7BA3D6B4558D0C44D2CD8A0F1626968295031BABFD2CB96B031B4C00A44F2C554B5B217AE67E69EB4
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Pangnirtung) {.. {-9223372036854775808 0 0 -00}.. {-1546300800 -14400 0 AST}.. {-880221600 -10800 1 AWT}.. {-769395600 -10800 1 APT}.. {-765399600 -14400 0 AST}.. {-147902400 -7200 1 ADDT}.. {-131572800 -14400 0 AST}.. {325663200 -10800 1 ADT}.. {341384400 -14400 0 AST}.. {357112800 -10800 1 ADT}.. {372834000 -14400 0 AST}.. {388562400 -10800 1 ADT}.. {404888400 -14400 0 AST}.. {420012000 -10800 1 ADT}.. {436338000 -14400 0 AST}.. {452066400 -10800 1 ADT}.. {467787600 -14400 0 AST}.. {483516000 -10800 1 ADT}.. {499237200 -14400 0 AST}.. {514965600 -10800 1 ADT}.. {530686800 -14400 0 AST}.. {544600800 -10800 1 ADT}.. {562136400 -14400 0 AST}.. {576050400 -10800 1 ADT}.. {594190800 -14400 0 AST}.. {607500000 -10800 1 ADT}.. {625640400 -14400 0 AST}.. {638949600 -10800 1 ADT}.. {657090000 -14400 0 AST}.. {671004000 -10800 1 ADT}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):253
                                                                                                                                                                                          Entropy (8bit):4.784405839512086
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/290olofDm2OHekeoHXFIV/1Vw/9vVOzFZg/VVFAKV:MB86290oloLmdHeVCXqV/k/9v4zW/OW
                                                                                                                                                                                          MD5:BFCE7E2618D6935031D6941AD6DDD8E3
                                                                                                                                                                                          SHA1:1953CD224FB2363B10372C0476760F3FB020CB00
                                                                                                                                                                                          SHA-256:B3EE44B3526BEDFC25B806371D3C465FDBD6CC647F30BF093750651E4A0C1BE4
                                                                                                                                                                                          SHA-512:31262DF034E084DA4CDB57B99178594C29129F61F3535E5D8245B8BB4AB6BF314307B0F5E58B74C349684CD761C9CDE44EB10407FB135BA6427D3D1E9DA99B40
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Paramaribo) {.. {-9223372036854775808 -13240 0 LMT}.. {-1861906760 -13252 0 PMT}.. {-1104524348 -13236 0 PMT}.. {-765317964 -12600 0 -0330}.. {465449400 -10800 0 -03}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):496
                                                                                                                                                                                          Entropy (8bit):4.444598497301421
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB86290OXmdH514YCvb8o1W4S9xRvhhHRVxORBYUNv:5tekdvYP1x52yq
                                                                                                                                                                                          MD5:062ECA57C0B795780240CD7AFE70BDA0
                                                                                                                                                                                          SHA1:89D71A11DD8D4E000F7FADBDDC77C4C1DC1195F7
                                                                                                                                                                                          SHA-256:DFA0EC91804B789A1A7E1B1977710435D2589A5B54C1579C8E1F5BF96D2FD007
                                                                                                                                                                                          SHA-512:7D123AA872E0B8286A26E338AE0F8E0D7A6F0F2EA8B1EBEC6DBB59477C812985CB246AD397D0901A58FDB7FF14171CF60169DC15C538B95C58BD2D46106A7A4D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Phoenix) {.. {-9223372036854775808 -26898 0 LMT}.. {-2717643600 -25200 0 MST}.. {-1633273200 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1601823600 -21600 1 MDT}.. {-1583683200 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-820519140 -25200 0 MST}.. {-796841940 -25200 0 MST}.. {-94669200 -25200 0 MST}.. {-84380400 -21600 1 MDT}.. {-68659200 -25200 0 MST}.. {-56221200 -25200 0 MST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):6613
                                                                                                                                                                                          Entropy (8bit):3.8549788442269395
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5Ux+E2p3T6ZqrNSMEBPMcywh4NF5zCC7IOTWa1HW1241UWK9BDL+3XC4BMrS2LxP:KOfS0HY2iU7KKdFL6Aa2K4gSLf8e
                                                                                                                                                                                          MD5:A720323DF122C70C1530788DB24700BA
                                                                                                                                                                                          SHA1:20674BD7D84CC686ABBB5D6B36B520A5E9C813ED
                                                                                                                                                                                          SHA-256:A89C580899AD2FF8DF45A783BB90D501DC32C28B92931CA18ABD13453E76244B
                                                                                                                                                                                          SHA-512:02B71E537B9FDAF1B68E381F0007CCBBA53EB70719ED38F51B56C5BFA64C7E3D9797053C9DE3A920E5CAFA09BBC062FCED62B5D6B9213AFA8286B95DEDAB0532
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Port-au-Prince) {.. {-9223372036854775808 -17360 0 LMT}.. {-2524504240 -17340 0 PPMT}.. {-1670483460 -18000 0 EST}.. {421218000 -14400 1 EDT}.. {436334400 -18000 0 EST}.. {452062800 -14400 1 EDT}.. {467784000 -18000 0 EST}.. {483512400 -14400 1 EDT}.. {499233600 -18000 0 EST}.. {514962000 -14400 1 EDT}.. {530683200 -18000 0 EST}.. {546411600 -14400 1 EDT}.. {562132800 -18000 0 EST}.. {576050400 -14400 1 EDT}.. {594194400 -18000 0 EST}.. {607500000 -14400 1 EDT}.. {625644000 -18000 0 EST}.. {638949600 -14400 1 EDT}.. {657093600 -18000 0 EST}.. {671004000 -14400 1 EDT}.. {688543200 -18000 0 EST}.. {702453600 -14400 1 EDT}.. {719992800 -18000 0 EST}.. {733903200 -14400 1 EDT}.. {752047200 -18000 0 EST}.. {765352800 -14400 1 EDT}.. {783496800 -18000 0 EST}.. {796802400 -14400 1 EDT}.. {814946400 -18000 0 EST}.. {828856800 -14400 1 EDT}
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):207
                                                                                                                                                                                          Entropy (8bit):4.919510214047913
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290e7490ppv:MByMYbpwt290190b
                                                                                                                                                                                          MD5:4AB394CB233B101627136EB5E070CF9B
                                                                                                                                                                                          SHA1:F00600CD2DB10FE157C3696F665B9759EEA85F99
                                                                                                                                                                                          SHA-256:A4952380C89A6903FFE5BF8707B94B1BB72568FFD03DB04BF4D98E38AC82EEB7
                                                                                                                                                                                          SHA-512:58F4AD08FA10F1884FA641C4EA778C0FC013EABBD68DF5DE04D5B301227396260C3D669DB33DD6A6B33F1550C24BBD7777D756DF0D61CEEAF5EC6541EDFA296C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Port_of_Spain) $TZData(:America/Puerto_Rico)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):201
                                                                                                                                                                                          Entropy (8bit):4.866417687745155
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7thteSHAIgpth9RN/290msh490th4:MByMYdIp7t290v490I
                                                                                                                                                                                          MD5:6B570E79FA2AA7D6CB1E56A11EE0A37C
                                                                                                                                                                                          SHA1:396A2C9BBE4F264DD5A4F2E44D3E63C57F52186B
                                                                                                                                                                                          SHA-256:52921EEA2A1925DF06CEA4638ED4128FAAA8FBA40ED4E0741650B419E5152DCB
                                                                                                                                                                                          SHA-512:FA75A179664BED02A0F5BC1B7C3DD5F3E986544A151634BA4C4401476F5999714C89E240D9AF805484D1BEC04A1A562157FAEECA1603C4FF8CFFB424B9DEB560
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Rio_Branco)]} {.. LoadTimeZoneFile America/Rio_Branco..}..set TZData(:America/Porto_Acre) $TZData(:America/Rio_Branco)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1051
                                                                                                                                                                                          Entropy (8bit):3.851275104153641
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5Xe4QJnSRs//SFs/pS9/MHSW/WOSr/nSso/TSL/SSU/iS5X/LcSi/xScd/ZlSQ/8:5kSeSFESoSQSrSsCSeSPS1cSQSQlSsSX
                                                                                                                                                                                          MD5:03046BA6F8344C32AD7A22748DC871AB
                                                                                                                                                                                          SHA1:AB9ED078D80AE99EF6DE4BF34AC45359B82D1284
                                                                                                                                                                                          SHA-256:E6E6F6753E7D443052A64D4DB07B8D443CE13A573946E7D0A19CDD4BBA4A2F04
                                                                                                                                                                                          SHA-512:620953BB4C8CF203262EC0C1F807543D24B9894C3B531AE57F7CEF630452CC9AC7CA41D43A6D8891F9CF17594E9EE34CF501F8508E7C0669A8E5EF9C70B6EAA3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Porto_Velho) {.. {-9223372036854775808 -15336 0 LMT}.. {-1767210264 -14400 0 -04}.. {-1206954000 -10800 1 -04}.. {-1191358800 -14400 0 -04}.. {-1175371200 -10800 1 -04}.. {-1159822800 -14400 0 -04}.. {-633816000 -10800 1 -04}.. {-622065600 -14400 0 -04}.. {-602280000 -10800 1 -04}.. {-591829200 -14400 0 -04}.. {-570744000 -10800 1 -04}.. {-560206800 -14400 0 -04}.. {-539121600 -10800 1 -04}.. {-531349200 -14400 0 -04}.. {-191361600 -10800 1 -04}.. {-184194000 -14400 0 -04}.. {-155160000 -10800 1 -04}.. {-150066000 -14400 0 -04}.. {-128894400 -10800 1 -04}.. {-121122000 -14400 0 -04}.. {-99950400 -10800 1 -04}.. {-89586000 -14400 0 -04}.. {-68414400 -10800 1 -04}.. {-57963600 -14400 0 -04}.. {499752000 -10800 1 -04}.. {511239600 -14400 0 -04}.. {530596800 -10800 1 -04}.. {540270000 -14400 0 -04}.. {562132800 -10800 1 -04}.. {5712012
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):283
                                                                                                                                                                                          Entropy (8bit):4.781646667761219
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/290piDm2OH9VoHvMlFoeVVF70ZVVFUFkzk/lLJpR/lAov:MB862908mdHvCvMlGe/J0Z/uFkzk/lL1
                                                                                                                                                                                          MD5:E2E2E0D6677FFF2E37BBFC3522F2A9AA
                                                                                                                                                                                          SHA1:4C1C93E14FBC00B8B1E78B8D9631599164305EB1
                                                                                                                                                                                          SHA-256:2981248A9F14EBFC8791EC5453170376CBD549557E495EA0E331CC18556C958E
                                                                                                                                                                                          SHA-512:F056B03EB9945823F5284C840E06E298DD2DE854F1555CD16D0BB19D962B73EF34A05683E6369B0D89CB7C3F7D082C312CCA6F8C6A0BB53F5C75FE4A863FCD95
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Puerto_Rico) {.. {-9223372036854775808 -15865 0 LMT}.. {-2233035335 -14400 0 AST}.. {-873057600 -10800 0 AWT}.. {-769395600 -10800 1 APT}.. {-765399600 -14400 0 AST}.. {-757368000 -14400 0 AST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):3698
                                                                                                                                                                                          Entropy (8bit):3.6242875066986078
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:22SW+xUQjzoMUBI0nuUoDKlHslPlgiot7JC/Xk8NWse4r4g5xCEmSdLkUsZOn+ZW:28+xUQjzoMUBI0nuUoDK6lPlgiot7JCV
                                                                                                                                                                                          MD5:11B8DD9FB854C62D7692EDD2445C6F90
                                                                                                                                                                                          SHA1:51F2ABF95D73CA21674D1AA1C5F50501F76A7F3D
                                                                                                                                                                                          SHA-256:22418567D55A0E38CAB005665271D9279A384856FDF0CE5A9AEABDCD66CCBC72
                                                                                                                                                                                          SHA-512:B657DE13FF71268ABA1790AED7D60CC1DA867434CE78421AD023BDECCC5E1BA9863952029E07FB577B57A3247FA9157B2C0AA9F894658B3F032CC36DDE701887
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Punta_Arenas) {.. {-9223372036854775808 -17020 0 LMT}.. {-2524504580 -16966 0 SMT}.. {-1892661434 -18000 0 -05}.. {-1688410800 -16966 0 SMT}.. {-1619205434 -14400 0 -04}.. {-1593806400 -16966 0 SMT}.. {-1335986234 -18000 0 -05}.. {-1335985200 -14400 1 -05}.. {-1317585600 -18000 0 -05}.. {-1304362800 -14400 1 -05}.. {-1286049600 -18000 0 -05}.. {-1272826800 -14400 1 -05}.. {-1254513600 -18000 0 -05}.. {-1241290800 -14400 1 -05}.. {-1222977600 -18000 0 -05}.. {-1209754800 -14400 1 -05}.. {-1191355200 -18000 0 -05}.. {-1178132400 -14400 0 -04}.. {-870552000 -18000 0 -05}.. {-865278000 -14400 0 -04}.. {-718056000 -18000 0 -05}.. {-713649600 -14400 0 -04}.. {-36619200 -10800 1 -04}.. {-23922000 -14400 0 -04}.. {-3355200 -10800 1 -04}.. {7527600 -14400 0 -04}.. {24465600 -10800 1 -04}.. {37767600 -14400 0 -04}.. {55915200 -10800 1 -04}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8104
                                                                                                                                                                                          Entropy (8bit):3.8351355650290304
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:InJkLi8hbZlNA604qSScBgN+4ctDzIVQ/c/3hNxTh:IJ3qtfA604qSBgI7DBch
                                                                                                                                                                                          MD5:98E0F428A3773CE6FF0CEBF2F88EA81A
                                                                                                                                                                                          SHA1:3DFA7D21A31C99078A139C5F41740B8EAD4085C2
                                                                                                                                                                                          SHA-256:B1630FA919D652F30D23253E1C561BB76FB4D28844A2F614D08B0A25B17CFB27
                                                                                                                                                                                          SHA-512:11C8E1F15B3FDC36DAD12229038BE10DA231872F804BD9FFF1786192541C4ABAFB27099C24EC3122F92A0D94D7D4A6E1ACD0A05845EC614982176A859B74E9FF
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Rainy_River) {.. {-9223372036854775808 -22696 0 LMT}.. {-2366732504 -21600 0 CST}.. {-1632067200 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-923248800 -18000 1 CDT}.. {-880214400 -18000 0 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {136368000 -18000 1 CDT}.. {152089200 -21600 0 CST}.. {167817600 -18000 1 CDT}.. {183538800 -21600 0 CST}.. {199267200 -18000 1 CDT}.. {215593200 -21600 0 CST}.. {230716800 -18000 1 CDT}.. {247042800 -21600 0 CST}.. {262771200 -18000 1 CDT}.. {278492400 -21600 0 CST}.. {294220800 -18000 1 CDT}.. {309942000 -21600 0 CST}.. {325670400 -18000 1 CDT}.. {341391600 -21600 0 CST}.. {357120000 -18000 1 CDT}.. {372841200 -21600 0 CST}.. {388569600 -18000 1 CDT}.. {404895600 -21600 0 CST}.. {420019200 -18000 1 CDT}.. {436345200 -21600 0 CST}.. {452073600 -18000 1 CDT}.. {467794800 -21600 0 CS
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7614
                                                                                                                                                                                          Entropy (8bit):3.8349162993762267
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:Wi8h4ZlNA604qSScBgN+4ctDzIVQ/c/3hNxTh:bqOfA604qSBgI7DBch
                                                                                                                                                                                          MD5:793DAEDB7E3077DE52DCC3C8A7CBEC5B
                                                                                                                                                                                          SHA1:37562E9F28D51DED41FFD5FF2FF19E2E4E453B7A
                                                                                                                                                                                          SHA-256:AA8866D58BEAB07548180628FF423887BBF48AADB1B55392B288F7310F94A9B1
                                                                                                                                                                                          SHA-512:68A32B41DC2D3E730D6BE53656B0D566AB1BCC1E189A2FFDB5687A947EF4F4008BC17456F8CE0D59C838EEA87A44400231A44E6AB35BEDBF5D7779E1CD7EFD8A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Rankin_Inlet) {.. {-9223372036854775808 0 0 -00}.. {-410227200 -21600 0 CST}.. {-147895200 -14400 1 CDDT}.. {-131565600 -21600 0 CST}.. {325670400 -18000 1 CDT}.. {341391600 -21600 0 CST}.. {357120000 -18000 1 CDT}.. {372841200 -21600 0 CST}.. {388569600 -18000 1 CDT}.. {404895600 -21600 0 CST}.. {420019200 -18000 1 CDT}.. {436345200 -21600 0 CST}.. {452073600 -18000 1 CDT}.. {467794800 -21600 0 CST}.. {483523200 -18000 1 CDT}.. {499244400 -21600 0 CST}.. {514972800 -18000 1 CDT}.. {530694000 -21600 0 CST}.. {544608000 -18000 1 CDT}.. {562143600 -21600 0 CST}.. {576057600 -18000 1 CDT}.. {594198000 -21600 0 CST}.. {607507200 -18000 1 CDT}.. {625647600 -21600 0 CST}.. {638956800 -18000 1 CDT}.. {657097200 -21600 0 CST}.. {671011200 -18000 1 CDT}.. {688546800 -21600 0 CST}.. {702460800 -18000 1 CDT}.. {719996400 -21600 0 CST}.. {7
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1420
                                                                                                                                                                                          Entropy (8bit):3.78262494063765
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5aLexyGcChlrLPsw6kSS3h5R14eH8tf3GvIkuoYVZaI1kR8nd:5eTChlvEw6kSSx5H4a8tf3fkuoYVZDm+
                                                                                                                                                                                          MD5:4D12651CEE804EB9F29567CB37F12031
                                                                                                                                                                                          SHA1:54B2613475B8BDB1DBCCA53A4895DA021F66BDC0
                                                                                                                                                                                          SHA-256:A36AD4614FC9A2A433712B555156EDE03980B88EB91D8DC7E8B10451D6D7F7D3
                                                                                                                                                                                          SHA-512:E6690F6B6DF613C8B7289A2DB71FBC9B87B997707A6C3B4B45BDE8F347082AE8C69F212BAACE50F3C04E325ABE0976AF1F61107BDF8A15D5B88F11FAE11A9D00
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Recife) {.. {-9223372036854775808 -8376 0 LMT}.. {-1767217224 -10800 0 -03}.. {-1206957600 -7200 1 -03}.. {-1191362400 -10800 0 -03}.. {-1175374800 -7200 1 -03}.. {-1159826400 -10800 0 -03}.. {-633819600 -7200 1 -03}.. {-622069200 -10800 0 -03}.. {-602283600 -7200 1 -03}.. {-591832800 -10800 0 -03}.. {-570747600 -7200 1 -03}.. {-560210400 -10800 0 -03}.. {-539125200 -7200 1 -03}.. {-531352800 -10800 0 -03}.. {-191365200 -7200 1 -03}.. {-184197600 -10800 0 -03}.. {-155163600 -7200 1 -03}.. {-150069600 -10800 0 -03}.. {-128898000 -7200 1 -03}.. {-121125600 -10800 0 -03}.. {-99954000 -7200 1 -03}.. {-89589600 -10800 0 -03}.. {-68418000 -7200 1 -03}.. {-57967200 -10800 0 -03}.. {499748400 -7200 1 -03}.. {511236000 -10800 0 -03}.. {530593200 -7200 1 -03}.. {540266400 -10800 0 -03}.. {562129200 -7200 1 -03}.. {571197600 -10800 0 -03}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1781
                                                                                                                                                                                          Entropy (8bit):4.034282439637634
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB86290hjmdHfCv24Q1NAvHaE+YB+Q4kRcMxIeRUVX/SEQd1rRR9xRv0+Ro/wPjp:5EjeavTGOtAVvSRBpx0yq1epwD+yz+
                                                                                                                                                                                          MD5:14B29B4391B643E5707096ADCC33C57E
                                                                                                                                                                                          SHA1:B3F875ABB79C634C74307B7CB7B276B13AEE11D1
                                                                                                                                                                                          SHA-256:50105E788288CF4C680B29BBDCDE94D8713A5361B38C6C469FD97CF05503FF7D
                                                                                                                                                                                          SHA-512:D92A51547DF2C1AB6E6CDEFF34C07B755D3F6BB5E7DD1907693E7658EDE4D2BADC5DEFDB658ADD0F8D8F14B3B87CEA17BC00DAC364C5CB7ACBF8778C245276A9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Regina) {.. {-9223372036854775808 -25116 0 LMT}.. {-2030202084 -25200 0 MST}.. {-1632063600 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1251651600 -21600 1 MDT}.. {-1238349600 -25200 0 MST}.. {-1220202000 -21600 1 MDT}.. {-1206900000 -25200 0 MST}.. {-1188752400 -21600 1 MDT}.. {-1175450400 -25200 0 MST}.. {-1156698000 -21600 1 MDT}.. {-1144000800 -25200 0 MST}.. {-1125248400 -21600 1 MDT}.. {-1111946400 -25200 0 MST}.. {-1032714000 -21600 1 MDT}.. {-1016992800 -25200 0 MST}.. {-1001264400 -21600 1 MDT}.. {-986148000 -25200 0 MST}.. {-969814800 -21600 1 MDT}.. {-954093600 -25200 0 MST}.. {-937760400 -21600 1 MDT}.. {-922039200 -25200 0 MST}.. {-906310800 -21600 1 MDT}.. {-890589600 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-748450800 -21600 1 MDT}.. {-732729600 -25200 0 MST
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7610
                                                                                                                                                                                          Entropy (8bit):3.8312000314798085
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:li8h4Z80NA604qSScBgN+4ctDzIVQ/c/3hNxTh:EqOzA604qSBgI7DBch
                                                                                                                                                                                          MD5:541EACD872723603971058CB205121D7
                                                                                                                                                                                          SHA1:8F7DFD5ECA2913846D9342839AE1C60882153DA0
                                                                                                                                                                                          SHA-256:643CC43E3F906779C040E1F0C20E78D6E95CC7301B3C7370A8ADBCBD76A8C5E8
                                                                                                                                                                                          SHA-512:971D06D3FB67B7AE79EEDB6D3EBB805B5992C2BF4A7166016B405E21BFB25D9A87A757E8065073D5FBEB9084F6F742269A5BF432BF2F03D30913DB092E1AB3A1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Resolute) {.. {-9223372036854775808 0 0 -00}.. {-704937600 -21600 0 CST}.. {-147895200 -14400 1 CDDT}.. {-131565600 -21600 0 CST}.. {325670400 -18000 1 CDT}.. {341391600 -21600 0 CST}.. {357120000 -18000 1 CDT}.. {372841200 -21600 0 CST}.. {388569600 -18000 1 CDT}.. {404895600 -21600 0 CST}.. {420019200 -18000 1 CDT}.. {436345200 -21600 0 CST}.. {452073600 -18000 1 CDT}.. {467794800 -21600 0 CST}.. {483523200 -18000 1 CDT}.. {499244400 -21600 0 CST}.. {514972800 -18000 1 CDT}.. {530694000 -21600 0 CST}.. {544608000 -18000 1 CDT}.. {562143600 -21600 0 CST}.. {576057600 -18000 1 CDT}.. {594198000 -21600 0 CST}.. {607507200 -18000 1 CDT}.. {625647600 -21600 0 CST}.. {638956800 -18000 1 CDT}.. {657097200 -21600 0 CST}.. {671011200 -18000 1 CDT}.. {688546800 -21600 0 CST}.. {702460800 -18000 1 CDT}.. {719996400 -21600 0 CST}.. {73391
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1112
                                                                                                                                                                                          Entropy (8bit):3.8413073465060457
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5Ybe/k5Yss/uuD/uVK/uNC/uvFe/uxJs/u74O/u83C/uc8J/uhF8/uNHs/ulU6Gs:505YsMw57XJh4CxUF/A6GTrtSUDwr
                                                                                                                                                                                          MD5:7E23FDE0E158E8ED2E7536EDE70D2588
                                                                                                                                                                                          SHA1:319052BE076DC79F130E807D68B11CCAA0636340
                                                                                                                                                                                          SHA-256:28082D20872B61D6098D31D1C40F12464A946A933CD9AF74475C5AF384210890
                                                                                                                                                                                          SHA-512:BE078ED12F05AB5CEE5D77212EB76A01A1BC52EEAA17E3B91D93B88D75E5281B6AF164E712A9AB0F57A21B3CDB20F6FCCADB73CAC4745B5D2E665D18F9F06B55
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Rio_Branco) {.. {-9223372036854775808 -16272 0 LMT}.. {-1767209328 -18000 0 -05}.. {-1206950400 -14400 1 -05}.. {-1191355200 -18000 0 -05}.. {-1175367600 -14400 1 -05}.. {-1159819200 -18000 0 -05}.. {-633812400 -14400 1 -05}.. {-622062000 -18000 0 -05}.. {-602276400 -14400 1 -05}.. {-591825600 -18000 0 -05}.. {-570740400 -14400 1 -05}.. {-560203200 -18000 0 -05}.. {-539118000 -14400 1 -05}.. {-531345600 -18000 0 -05}.. {-191358000 -14400 1 -05}.. {-184190400 -18000 0 -05}.. {-155156400 -14400 1 -05}.. {-150062400 -18000 0 -05}.. {-128890800 -14400 1 -05}.. {-121118400 -18000 0 -05}.. {-99946800 -14400 1 -05}.. {-89582400 -18000 0 -05}.. {-68410800 -14400 1 -05}.. {-57960000 -18000 0 -05}.. {499755600 -14400 1 -05}.. {511243200 -18000 0 -05}.. {530600400 -14400 1 -05}.. {540273600 -18000 0 -05}.. {562136400 -14400 1 -05}.. {57120480
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):219
                                                                                                                                                                                          Entropy (8bit):4.801485647578614
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7/MSHAIgp/M1ovN/290rI5290/M7:MByMY/M7p/M16t290r190/M7
                                                                                                                                                                                          MD5:90830F3B1F91FE48AC2944C7C92A3F6E
                                                                                                                                                                                          SHA1:777377AE4959DDD2B472EB6041A23A5B93D64BB6
                                                                                                                                                                                          SHA-256:0117D33D4F326AA536162D36A02439FBD5F2EB3B4F540B5BA91ED7747DDAC180
                                                                                                                                                                                          SHA-512:20A371E4550E402AFEB83EF19EFFF6B3C0D7A68DCAA06AD894D04DB63B7096560E701C45B455B23A98BB20FE3B590F920219152415CA506AEDA427BB1381B826
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Argentina/Cordoba)]} {.. LoadTimeZoneFile America/Argentina/Cordoba..}..set TZData(:America/Rosario) $TZData(:America/Argentina/Cordoba)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):194
                                                                                                                                                                                          Entropy (8bit):4.869058214823402
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7ekHAIgpeON/290tX2U490eBn:MByMYMpJt290c90m
                                                                                                                                                                                          MD5:F4E62378AA05771D348AA6DA516CD386
                                                                                                                                                                                          SHA1:07FCA813693F7944CBCBB128F2F2FE32929D37A2
                                                                                                                                                                                          SHA-256:3B4C2F3A5B9CD22A73F05187C032723D07BB53C9946D04D35E1BA1CB90CA0A62
                                                                                                                                                                                          SHA-512:E9F6CEB824D656CA25A72BF8EB4347A22E1A8E40410F01E0C2EDE19ACAF32D76540399796B3EBC7781C8B5D48C1A6B2C856CA06158AE37D95C95CF0567DFA2E5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Tijuana)]} {.. LoadTimeZoneFile America/Tijuana..}..set TZData(:America/Santa_Isabel) $TZData(:America/Tijuana)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1079
                                                                                                                                                                                          Entropy (8bit):3.8200568741699223
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5zeUdunSRs//SFs/pS9/MHSW/WOSr/nSso/TSL/SSU/iS5X/LcSi/xScd/ZlSQ/h:52SeSFESoSQSrSsCSeSPS1cSQSQlSsSU
                                                                                                                                                                                          MD5:7F2658032008F2C1308F121C2EBF2479
                                                                                                                                                                                          SHA1:B6F24E818B4424C0DEF818C103D1DA5359958932
                                                                                                                                                                                          SHA-256:4A397BD937DE1D7E6A941D18001B34D4CD195AEFD08951C30C7EE8E48656AA0E
                                                                                                                                                                                          SHA-512:F78853AA75F58A85555DD79E08A7487E5161854650DBF480189790D855738FEDCBDA936870067DE40FE000861008A9E9AAF61DF02B6B30B96038C61B5E1F1C1D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Santarem) {.. {-9223372036854775808 -13128 0 LMT}.. {-1767212472 -14400 0 -04}.. {-1206954000 -10800 1 -04}.. {-1191358800 -14400 0 -04}.. {-1175371200 -10800 1 -04}.. {-1159822800 -14400 0 -04}.. {-633816000 -10800 1 -04}.. {-622065600 -14400 0 -04}.. {-602280000 -10800 1 -04}.. {-591829200 -14400 0 -04}.. {-570744000 -10800 1 -04}.. {-560206800 -14400 0 -04}.. {-539121600 -10800 1 -04}.. {-531349200 -14400 0 -04}.. {-191361600 -10800 1 -04}.. {-184194000 -14400 0 -04}.. {-155160000 -10800 1 -04}.. {-150066000 -14400 0 -04}.. {-128894400 -10800 1 -04}.. {-121122000 -14400 0 -04}.. {-99950400 -10800 1 -04}.. {-89586000 -14400 0 -04}.. {-68414400 -10800 1 -04}.. {-57963600 -14400 0 -04}.. {499752000 -10800 1 -04}.. {511239600 -14400 0 -04}.. {530596800 -10800 1 -04}.. {540270000 -14400 0 -04}.. {562132800 -10800 1 -04}.. {571201200
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8871
                                                                                                                                                                                          Entropy (8bit):3.5333393351633897
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:5Gv/IxUQjzoMUBI0nuUoDK6lPlgiot7JC/k8NWse4r4g5xCEmMQUs8nCxvisEbzQ:5Aa9TzDCjg32+E
                                                                                                                                                                                          MD5:0659C7482FC6121AF4714DA6E2188069
                                                                                                                                                                                          SHA1:79D8B13C54AEDE9EDC191EB92F8CD6BE936490F4
                                                                                                                                                                                          SHA-256:B2D7FD4DB34800C9EF9BD73CDDB1105543CCED05F3E2AC99F3E5E2F6CF340AE2
                                                                                                                                                                                          SHA-512:C138C580648D7EAAB22828EA4318F6FAEEF618B994C2E05AF23ACF03A279506053C85BFDBC03B9E32B1CA5826713D7FFC249CE33B3F0EA734A2E4CE626AAB3A3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Santiago) {.. {-9223372036854775808 -16966 0 LMT}.. {-2524504634 -16966 0 SMT}.. {-1892661434 -18000 0 -05}.. {-1688410800 -16966 0 SMT}.. {-1619205434 -14400 0 -04}.. {-1593806400 -16966 0 SMT}.. {-1335986234 -18000 0 -05}.. {-1335985200 -14400 1 -05}.. {-1317585600 -18000 0 -05}.. {-1304362800 -14400 1 -05}.. {-1286049600 -18000 0 -05}.. {-1272826800 -14400 1 -05}.. {-1254513600 -18000 0 -05}.. {-1241290800 -14400 1 -05}.. {-1222977600 -18000 0 -05}.. {-1209754800 -14400 1 -05}.. {-1191355200 -18000 0 -05}.. {-1178132400 -14400 0 -04}.. {-870552000 -18000 0 -05}.. {-865278000 -14400 0 -04}.. {-740520000 -10800 1 -03}.. {-736376400 -14400 0 -04}.. {-718056000 -18000 0 -05}.. {-713649600 -14400 0 -04}.. {-36619200 -10800 1 -04}.. {-23922000 -14400 0 -04}.. {-3355200 -10800 1 -04}.. {7527600 -14400 0 -04}.. {24465600 -10800 1 -04}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):616
                                                                                                                                                                                          Entropy (8bit):4.330655351784895
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB86290/StmdHhvCvuCY/h/uFkS/5MVvMrW//MVvMrpx/m0XVvMr4UB/47VvMr/d:5+seQvuCY5/u/REfk+xxdbUBQpu652GO
                                                                                                                                                                                          MD5:FAD0621010889164ADC4472003C9391F
                                                                                                                                                                                          SHA1:C4EE0B8D6925338D17D5745DE9D45FA3C628DFC5
                                                                                                                                                                                          SHA-256:2217E72B11A90F2D679C175DE3CC0F2FED4C280C9FF9707CFFAF118BF9A06A4B
                                                                                                                                                                                          SHA-512:90E8E5A109CD72458C7796CF0324F63E543CCD63D13A09A3DD28EDC8B2793C964C18E79FDF0C5067C5A481B7FB03E8413139C32F59DA07E9D7893378ABBBD2B3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Santo_Domingo) {.. {-9223372036854775808 -16776 0 LMT}.. {-2524504824 -16800 0 SDMT}.. {-1159773600 -18000 0 EST}.. {-100119600 -14400 1 EDT}.. {-89668800 -18000 0 EST}.. {-5770800 -16200 1 -0430}.. {4422600 -18000 0 EST}.. {25678800 -16200 1 -0430}.. {33193800 -18000 0 EST}.. {57733200 -16200 1 -0430}.. {64816200 -18000 0 EST}.. {89182800 -16200 1 -0430}.. {96438600 -18000 0 EST}.. {120632400 -16200 1 -0430}.. {127974600 -18000 0 EST}.. {152082000 -14400 0 AST}.. {975823200 -14400 0 AST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2900
                                                                                                                                                                                          Entropy (8bit):3.6548008349990755
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5uFChlvEwR9xSSx5H4a8tf3fku+da2XUd23t8VZDG8+w/ghBPWTRz908a9zRgwun:cFIlvEwZSSxdF8tfMu+da2kdCt8VZy8n
                                                                                                                                                                                          MD5:F6B732A862659EB131C2E6FEC00E9734
                                                                                                                                                                                          SHA1:49517DF63BC5B6FEC875CE9477BBF84F4072FA31
                                                                                                                                                                                          SHA-256:0E7BA1C5A3FA3DABDAA226BFE1E8D797A3835EA554828881AB5E365EDA09B92E
                                                                                                                                                                                          SHA-512:670A5B604B5EA0F5FA15083BC1EA115B7EFD449F9EAC4518E109493591893DD3627AFC6628E0EDD1953E932E2A7AD9B5A379526548677158EC445366E4ED7166
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Sao_Paulo) {.. {-9223372036854775808 -11188 0 LMT}.. {-1767214412 -10800 0 -03}.. {-1206957600 -7200 1 -03}.. {-1191362400 -10800 0 -03}.. {-1175374800 -7200 1 -03}.. {-1159826400 -10800 0 -03}.. {-633819600 -7200 1 -03}.. {-622069200 -10800 0 -03}.. {-602283600 -7200 1 -03}.. {-591832800 -10800 0 -03}.. {-570747600 -7200 1 -03}.. {-560210400 -10800 0 -03}.. {-539125200 -7200 1 -03}.. {-531352800 -10800 0 -03}.. {-195429600 -7200 1 -02}.. {-189381600 -7200 0 -03}.. {-184197600 -10800 0 -03}.. {-155163600 -7200 1 -03}.. {-150069600 -10800 0 -03}.. {-128898000 -7200 1 -03}.. {-121125600 -10800 0 -03}.. {-99954000 -7200 1 -03}.. {-89589600 -10800 0 -03}.. {-68418000 -7200 1 -03}.. {-57967200 -10800 0 -03}.. {499748400 -7200 1 -03}.. {511236000 -10800 0 -03}.. {530593200 -7200 1 -03}.. {540266400 -10800 0 -03}.. {562129200 -7200 1 -03}
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):6839
                                                                                                                                                                                          Entropy (8bit):3.565857684485945
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:9OgtbdF7TI7nYUYXg9W/OAcv7vuShytWi0PnvLrqPoKR2XszXckXtogYN4Ezlk0X:PJr9Q7TMq+ML
                                                                                                                                                                                          MD5:D1BF579FE8123E8EE9248A51E794CC78
                                                                                                                                                                                          SHA1:BF9CB9BED143C7529719E0C1E2F88BE1AC9F8DD4
                                                                                                                                                                                          SHA-256:158BD9E4EB0B9DFF3F2D3E2DBA72F217B73423012DD33A688FD57852124E884A
                                                                                                                                                                                          SHA-512:78192AC38912021F848592D0B208CB122EFFC6DDB326540FFAADA4FD3322B7A442FD1116F408D64B8788520B46545DFAE571EA42046D62A282A97ECCD5663655
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Scoresbysund) {.. {-9223372036854775808 -5272 0 LMT}.. {-1686090728 -7200 0 -02}.. {323841600 -3600 0 -01}.. {338961600 -7200 0 -02}.. {354679200 0 0 +00}.. {370400400 -3600 0 -01}.. {386125200 0 1 +00}.. {401850000 -3600 0 -01}.. {417574800 0 1 +00}.. {433299600 -3600 0 -01}.. {449024400 0 1 +00}.. {465354000 -3600 0 -01}.. {481078800 0 1 +00}.. {496803600 -3600 0 -01}.. {512528400 0 1 +00}.. {528253200 -3600 0 -01}.. {543978000 0 1 +00}.. {559702800 -3600 0 -01}.. {575427600 0 1 +00}.. {591152400 -3600 0 -01}.. {606877200 0 1 +00}.. {622602000 -3600 0 -01}.. {638326800 0 1 +00}.. {654656400 -3600 0 -01}.. {670381200 0 1 +00}.. {686106000 -3600 0 -01}.. {701830800 0 1 +00}.. {717555600 -3600 0 -01}.. {733280400 0 1 +00}.. {749005200 -3600 0 -01}.. {764730000 0 1 +00}.. {780454800 -3600 0 -01}.. {796179600 0 1 +00}.. {8
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):187
                                                                                                                                                                                          Entropy (8bit):4.888573146674231
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx06RGFfXHAIg206RORL/2IAcGEtOFBx+IAcGE6RB:SlSWB9vsM3y7+SPHAIgp+ON/290tO09Z
                                                                                                                                                                                          MD5:2FF74846ADF32AA3A9418376775B7F25
                                                                                                                                                                                          SHA1:130D7548DFFEBCE74969962E335B40299D7C5C54
                                                                                                                                                                                          SHA-256:BF4FAB3AE72CC7FA4F9E34CF0551A85C54A084CD826DF5D9CC684DE6188E84DB
                                                                                                                                                                                          SHA-512:9E52C017E595EEF1C68C8A1943416A9109D7DB4C32D25F83D05213C4200869A50E2E726894E39ECA364C558BB7F5566F6150CEA5D3CB14D1DEAE28C3D8C810E0
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Denver)]} {.. LoadTimeZoneFile America/Denver..}..set TZData(:America/Shiprock) $TZData(:America/Denver)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8651
                                                                                                                                                                                          Entropy (8bit):3.959337076866423
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:IGCG0hPC9+j1giaJCUbtp0nFI+g/iexpCVaBnNnt61nctE1:I5G0A9DiaJCUbPI+D/iMpCIBSuk
                                                                                                                                                                                          MD5:7CCB6902749079A0496F1E2E2137448E
                                                                                                                                                                                          SHA1:3D0ED7BF1C26659F6794E26AE3869F8AB925B6DF
                                                                                                                                                                                          SHA-256:ABB08435CAE80119068A85984BFFE9C1596F4FB90F07CC01124C907E5162C189
                                                                                                                                                                                          SHA-512:0B5B2DCECC70F357DB6D590AB63E600C572EA6B3F430565EFEB29777B1901AAC55CACC7495C668F739201076B180402141BC1B2ED2357E9B4DFBABF3B122AB44
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Sitka) {.. {-9223372036854775808 53927 0 LMT}.. {-3225223727 -32473 0 LMT}.. {-2188954727 -28800 0 PST}.. {-883584000 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-757353600 -28800 0 PST}.. {-31507200 -28800 0 PST}.. {-21477600 -25200 1 PDT}.. {-5756400 -28800 0 PST}.. {9972000 -25200 1 PDT}.. {25693200 -28800 0 PST}.. {41421600 -25200 1 PDT}.. {57747600 -28800 0 PST}.. {73476000 -25200 1 PDT}.. {89197200 -28800 0 PST}.. {104925600 -25200 1 PDT}.. {120646800 -28800 0 PST}.. {126698400 -25200 1 PDT}.. {152096400 -28800 0 PST}.. {162381600 -25200 1 PDT}.. {183546000 -28800 0 PST}.. {199274400 -25200 1 PDT}.. {215600400 -28800 0 PST}.. {230724000 -25200 1 PDT}.. {247050000 -28800 0 PST}.. {262778400 -25200 1 PDT}.. {278499600 -28800 0 PST}.. {294228000 -25200 1 PDT}.. {3099492
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):207
                                                                                                                                                                                          Entropy (8bit):4.932842207797733
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290txP90ppv:MByMYbpwt2907P90b
                                                                                                                                                                                          MD5:CBFA61DBF6F7459CF8D517402B29998E
                                                                                                                                                                                          SHA1:A562B29C9470DBD25480966B0462433124BA4164
                                                                                                                                                                                          SHA-256:353CDBD46BA8C7472A93E9E800A69105801F6784B22EC50A59294CDC3BE40E18
                                                                                                                                                                                          SHA-512:00B333EAA2C32EDDA8F06457AD0E10013A0147B20F504F4F1096656F731A7C1896D5ABD83E7EDBD5D4E7DA587EE9BFA796539EB1E9F4056D75D1FDF203251150
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/St_Barthelemy) $TZData(:America/Puerto_Rico)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):11289
                                                                                                                                                                                          Entropy (8bit):3.8713946894934614
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:PmxVjd1cO8f7/EjUhSicN6zvfwb+8YbTE0M0J:PmrcOI7/EjiskY01J
                                                                                                                                                                                          MD5:8F068899DA75663128320633E1881333
                                                                                                                                                                                          SHA1:E9161B45D7B11A2DD6E9679AC080E84EC51561E3
                                                                                                                                                                                          SHA-256:E2917204B0C843C32051BB371CF6D0AD272C02720B9C0D913AC072C8ABE1EC64
                                                                                                                                                                                          SHA-512:2200E9B9D816157330ADAEA7383635876E5A37329B1AF9613D38BCFBE8143835837A25132A94E44A61DB8058ED98B1A33F295EA64BC1F4CE30966D52BB0B673D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/St_Johns) {.. {-9223372036854775808 -12652 0 LMT}.. {-2713897748 -12652 0 NST}.. {-1664130548 -9052 1 NDT}.. {-1650137348 -12652 0 NST}.. {-1640982548 -12652 0 NST}.. {-1632076148 -9052 1 NDT}.. {-1615145348 -12652 0 NST}.. {-1609446548 -12652 0 NST}.. {-1598650148 -9052 1 NDT}.. {-1590100148 -12652 0 NST}.. {-1567286948 -9052 1 NDT}.. {-1551565748 -12652 0 NST}.. {-1535837348 -9052 1 NDT}.. {-1520116148 -12652 0 NST}.. {-1503782948 -9052 1 NDT}.. {-1488666548 -12652 0 NST}.. {-1472333348 -9052 1 NDT}.. {-1457216948 -12652 0 NST}.. {-1440883748 -9052 1 NDT}.. {-1425767348 -12652 0 NST}.. {-1409434148 -9052 1 NDT}.. {-1394317748 -12652 0 NST}.. {-1377984548 -9052 1 NDT}.. {-1362263348 -12652 0 NST}.. {-1346534948 -9052 1 NDT}.. {-1330813748 -12652 0 NST}.. {-1314480548 -9052 1 NDT}.. {-1299364148 -12652 0 NST}.. {-1283030948 -9052 1 ND
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):202
                                                                                                                                                                                          Entropy (8bit):4.907031043022691
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290tMp490ppv:MByMYbpwt290g490b
                                                                                                                                                                                          MD5:D521F2D9B28C5374FC3BD540C6B6F40D
                                                                                                                                                                                          SHA1:39A3D86CB71F742F33B02F50B316638815B3CD4E
                                                                                                                                                                                          SHA-256:EDB9457A7C64E47062BDC6458FD3BCFCD6C37820F1A2BC89DFE99ED77355011F
                                                                                                                                                                                          SHA-512:05C1BE92550A962904ED3BB7DECCAC16FCB54D258F24F2AEDF755FCC44E4FEF5F86AB663945809F5D7AFA64178E807BBDAE77048270ED516DFF2C7720A746D52
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/St_Kitts) $TZData(:America/Puerto_Rico)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):202
                                                                                                                                                                                          Entropy (8bit):4.9037013606484905
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290tY90ppv:MByMYbpwt290a90b
                                                                                                                                                                                          MD5:9392E5A7BD198B0308F9271E4C7E59B2
                                                                                                                                                                                          SHA1:A902440920A0318BC930957C74804A9A51EF7818
                                                                                                                                                                                          SHA-256:6727A509BB937CB3446D41B57826DE70C7028E96F088AB5B7F803BEAA18279E8
                                                                                                                                                                                          SHA-512:6DA1EAC390E72905DF1A14D82362B499D20FAD6D85F3DF116AE01E566D5D19C6D16E56DA72C458BB6143345EF45F35A53B245488C641D80BFBA200B16A59719E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/St_Lucia) $TZData(:America/Puerto_Rico)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):203
                                                                                                                                                                                          Entropy (8bit):4.919272465019375
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290tXIMFJ490ppv:MByMYbpwt290tJ490b
                                                                                                                                                                                          MD5:49D0C8DAFCA053C9967EDCC4C0A484B1
                                                                                                                                                                                          SHA1:7B4999D4B9AD93306BD411DF2946D741EC597770
                                                                                                                                                                                          SHA-256:974AEED3D79124B50265C83D84F23CBE4F0328D00C75F42DD3ABC5D4C0A78DE1
                                                                                                                                                                                          SHA-512:378E3657B26C5A039FF82ECCAC7797FF45CBC6479596629B3048164EE4E035F4ECFC557AA9EAF6848E78999B4FF8C63E53C7163BDF6F626ED6111004490D6F80
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/St_Thomas) $TZData(:America/Puerto_Rico)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):204
                                                                                                                                                                                          Entropy (8bit):4.909053768717241
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290tzb+Q90ppv:MByMYbpwt290xyQ90b
                                                                                                                                                                                          MD5:6CFB23E7164605CDE380FB7C4D88DF11
                                                                                                                                                                                          SHA1:CC513B29AD7B59E600DBCBC97927EB632558F657
                                                                                                                                                                                          SHA-256:6B19404D295964EF66F47802836BB728FCE8E6481115797C0B5F200C354D7C8A
                                                                                                                                                                                          SHA-512:728987D0925B6E12E8A220920BEDF94180880E78F3F08F6AC740E6304B22D446846068CEA499F61E7032ADB2E700CE31954921D478C9A8B6CB599E05A6292EA3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/St_Vincent) $TZData(:America/Puerto_Rico)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):874
                                                                                                                                                                                          Entropy (8bit):4.253846650171654
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB86290hEbmdHLCvYX4Q19xRv0+RmwPj+uLkQOzL3+ORL4FXgenM7RSslKA1PyKp:5zeOvT4xuyqoYaAxt7l
                                                                                                                                                                                          MD5:C91F801CC5E9F78B966D1DF2259C38A8
                                                                                                                                                                                          SHA1:D29C970CBFC74684D46AAAD543B73B520775632C
                                                                                                                                                                                          SHA-256:939B25C9412B9E25D73F552E87826999FC8C929770E66491D1E4530046D3E758
                                                                                                                                                                                          SHA-512:093378E61DE9310F9C48170CBB0FDBD3C79E184DA1489F759B20BCE410006A9D5A793C82E79A46E0AFF0DAA47D9DBAFD605959E491BA9ED4E55D26F293642D32
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Swift_Current) {.. {-9223372036854775808 -25880 0 LMT}.. {-2030201320 -25200 0 MST}.. {-1632063600 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-747241200 -21600 0 MDT}.. {-732729600 -25200 0 MST}.. {-715791600 -21600 1 MDT}.. {-702489600 -25200 0 MST}.. {-684342000 -21600 1 MDT}.. {-671040000 -25200 0 MST}.. {-652892400 -21600 1 MDT}.. {-639590400 -25200 0 MST}.. {-631126800 -25200 0 MST}.. {-400086000 -21600 1 MDT}.. {-384364800 -25200 0 MST}.. {-337186800 -21600 1 MDT}.. {-321465600 -25200 0 MST}.. {-305737200 -21600 1 MDT}.. {-292435200 -25200 0 MST}.. {-273682800 -21600 1 MDT}.. {-260985600 -25200 0 MST}.. {73472400 -21600 0 CST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):341
                                                                                                                                                                                          Entropy (8bit):4.638828647226646
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2903fDm2OHskeoHxbV1ULhgdrV/uF+IcmJ3/uF+ivi9/uF+SNv:MB862903LmdHsVCn1ULSB/uF+QV/uF+q
                                                                                                                                                                                          MD5:4C4034ABAB9E4804CCB23E51694044C9
                                                                                                                                                                                          SHA1:7DB24CE83AB2C07E6F6784D27C4E3AC0F149D080
                                                                                                                                                                                          SHA-256:1F0503579B0DDDBAF88814A278127D9CD7019EDD3C35F4CBFC0EF11C0EDAFE5B
                                                                                                                                                                                          SHA-512:0BC366CD3AB2E1388D11770DC8DEC1FC94C48FDC846ABB6C487828BF9FF15CD9A1C15B33E08F6E48B7F4A6F2AD1617FF12B359784CA4C32256D72422E6825105
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Tegucigalpa) {.. {-9223372036854775808 -20932 0 LMT}.. {-1538503868 -21600 0 CST}.. {547020000 -18000 1 CDT}.. {559717200 -21600 0 CST}.. {578469600 -18000 1 CDT}.. {591166800 -21600 0 CST}.. {1146981600 -18000 1 CDT}.. {1154926800 -21600 0 CST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):6890
                                                                                                                                                                                          Entropy (8bit):3.8331465442823704
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:mJInJuFW4ng2CEBJuQaeEy9P19OBYEi/B51B7/Bm6BTd69xK7KjhVbHyR3h1gOZM:miFCC
                                                                                                                                                                                          MD5:D93B62D5F7EEBC28AC047BED2307CAE8
                                                                                                                                                                                          SHA1:8B3E02240A01B5AA42D30E86005E880916432227
                                                                                                                                                                                          SHA-256:7FB0CBB101D3B6FBB6B9DAD5446BBF9E6AEC65EC38472739E604F68F6AA9AB7B
                                                                                                                                                                                          SHA-512:3648106F4DF84CFD94AAD4E9430F8D3BBCB38A9196DE9A59246DFBBC170FADBF106DD1FD08FE2E4F7319BFFB1C2607E4F5D563C222CED8267483D1A0C388CCE5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Thule) {.. {-9223372036854775808 -16508 0 LMT}.. {-1686079492 -14400 0 AST}.. {670399200 -10800 1 ADT}.. {686120400 -14400 0 AST}.. {701848800 -10800 1 ADT}.. {717570000 -14400 0 AST}.. {733903200 -10800 1 ADT}.. {752043600 -14400 0 AST}.. {765352800 -10800 1 ADT}.. {783493200 -14400 0 AST}.. {796802400 -10800 1 ADT}.. {814942800 -14400 0 AST}.. {828856800 -10800 1 ADT}.. {846392400 -14400 0 AST}.. {860306400 -10800 1 ADT}.. {877842000 -14400 0 AST}.. {891756000 -10800 1 ADT}.. {909291600 -14400 0 AST}.. {923205600 -10800 1 ADT}.. {941346000 -14400 0 AST}.. {954655200 -10800 1 ADT}.. {972795600 -14400 0 AST}.. {986104800 -10800 1 ADT}.. {1004245200 -14400 0 AST}.. {1018159200 -10800 1 ADT}.. {1035694800 -14400 0 AST}.. {1049608800 -10800 1 ADT}.. {1067144400 -14400 0 AST}.. {1081058400 -10800 1 ADT}.. {1099198800 -14400 0 AST}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8330
                                                                                                                                                                                          Entropy (8bit):3.832494305415669
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:tDbEtCt/cL1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:tvEItON0HY2iUmUFLqU
                                                                                                                                                                                          MD5:8DD2E298AEB672F32AD8B44A0A84431A
                                                                                                                                                                                          SHA1:9687C478FC6803F4FFCA125D921DF821181B8E75
                                                                                                                                                                                          SHA-256:0F95CE0A36415B43E7B5E6CD790D3BD9EF6D53F4B7AA0235360C0847CBB3F0C1
                                                                                                                                                                                          SHA-512:9380327C04FC48A61423F161DFD4AC1C431278D5B392F585DCEB1D893CB8212C4093A92D5D089BC23DF0B5BB6F99595937999A6B1E843DAE1AF36D76B0858281
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Thunder_Bay) {.. {-9223372036854775808 -21420 0 LMT}.. {-2366733780 -21600 0 CST}.. {-1893434400 -18000 0 EST}.. {-883594800 -18000 0 EST}.. {-880218000 -14400 1 EWT}.. {-769395600 -14400 1 EPT}.. {-765396000 -18000 0 EST}.. {18000 -18000 0 EST}.. {9961200 -14400 1 EDT}.. {25682400 -18000 0 EST}.. {41410800 -14400 1 EDT}.. {57736800 -18000 0 EST}.. {73465200 -14400 1 EDT}.. {89186400 -18000 0 EST}.. {94712400 -18000 0 EST}.. {126248400 -18000 0 EST}.. {136364400 -14400 1 EDT}.. {152085600 -18000 0 EST}.. {167814000 -14400 1 EDT}.. {183535200 -18000 0 EST}.. {199263600 -14400 1 EDT}.. {215589600 -18000 0 EST}.. {230713200 -14400 1 EDT}.. {247039200 -18000 0 EST}.. {262767600 -14400 1 EDT}.. {278488800 -18000 0 EST}.. {294217200 -14400 1 EDT}.. {309938400 -18000 0 EST}.. {325666800 -14400 1 EDT}.. {341388000 -18000 0 EST}.. {35711
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8755
                                                                                                                                                                                          Entropy (8bit):3.8517632099398114
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:c4uS6mjvZk53mtw+N6IkWq/WHQlb/RYRWVIKr7cRRL:J6jFOzN6IkWq/WHQt/RY4yP
                                                                                                                                                                                          MD5:8F912B1F7E3144EE787E4386B1AE2AF1
                                                                                                                                                                                          SHA1:60236FC9AB9C06F614C76357915B57B286721BC6
                                                                                                                                                                                          SHA-256:FE3681F580ED7F3F2FD21F510DFF1BEF81BD521737F5846FA15FD309E44E69BE
                                                                                                                                                                                          SHA-512:87EA33079EEFED848150884BC41131B2CC49B0AAA5FA10C0700818A8C292F1F3AD928E98C98EF34EFC48F0E3AFB3CBBBE3D09C483A2CDA545DFF7CB77D29CB3E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Tijuana) {.. {-9223372036854775808 -28084 0 LMT}.. {-1514736000 -25200 0 MST}.. {-1451667600 -28800 0 PST}.. {-1343062800 -25200 0 MST}.. {-1234803600 -28800 0 PST}.. {-1222963200 -25200 1 PDT}.. {-1207242000 -28800 0 PST}.. {-873820800 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-761677200 -28800 0 PST}.. {-686073600 -25200 1 PDT}.. {-661539600 -28800 0 PST}.. {-504892800 -28800 0 PST}.. {-495039600 -25200 1 PDT}.. {-481734000 -28800 0 PST}.. {-463590000 -25200 1 PDT}.. {-450284400 -28800 0 PST}.. {-431535600 -25200 1 PDT}.. {-418230000 -28800 0 PST}.. {-400086000 -25200 1 PDT}.. {-386780400 -28800 0 PST}.. {-368636400 -25200 1 PDT}.. {-355330800 -28800 0 PST}.. {-337186800 -25200 1 PDT}.. {-323881200 -28800 0 PST}.. {-305737200 -25200 1 PDT}.. {-292431600 -28800 0 PST}.. {-283968000 -28800 0 PST}.. {189331200 -28800 0 PST}.. {19
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):11248
                                                                                                                                                                                          Entropy (8bit):3.8061065077303926
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:lBew85RnK1a8phYBNXEtCt/cL1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:lBq5RnK1a8phYTXEItON0HY2iUmUFLqU
                                                                                                                                                                                          MD5:0D906EC3F658730131A65C5A770D885F
                                                                                                                                                                                          SHA1:BFA72C43BCE0F37F795E974457FBE4A664687B38
                                                                                                                                                                                          SHA-256:5A98C6BEDDA4DF608051D702A8E037093A8068E1B85F8F55D42B4468F45662A5
                                                                                                                                                                                          SHA-512:CC634DAF4EEC7F57E3AB0C20D891380A7F96DE79602A7B57C6C2BF229DD76A69B399A689FA6D0675380B1432C2115B0C8577DC49C3C9E567A08CAD6FCC3599BC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Toronto) {.. {-9223372036854775808 -19052 0 LMT}.. {-2366736148 -18000 0 EST}.. {-1632070800 -14400 1 EDT}.. {-1615140000 -18000 0 EST}.. {-1609441200 -18000 0 EST}.. {-1601753400 -14400 1 EDT}.. {-1583697600 -18000 0 EST}.. {-1567357200 -14400 1 EDT}.. {-1554667200 -18000 0 EST}.. {-1534698000 -14400 1 EDT}.. {-1524074400 -18000 0 EST}.. {-1503248400 -14400 1 EDT}.. {-1492365600 -18000 0 EST}.. {-1471798800 -14400 1 EDT}.. {-1460916000 -18000 0 EST}.. {-1440954000 -14400 1 EDT}.. {-1428861600 -18000 0 EST}.. {-1409504400 -14400 1 EDT}.. {-1397412000 -18000 0 EST}.. {-1378054800 -14400 1 EDT}.. {-1365962400 -18000 0 EST}.. {-1346605200 -14400 1 EDT}.. {-1333908000 -18000 0 EST}.. {-1315155600 -14400 1 EDT}.. {-1301853600 -18000 0 EST}.. {-1283706000 -14400 1 EDT}.. {-1270404000 -18000 0 EST}.. {-1252256400 -14400 1 EDT}.. {-1238954400
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):201
                                                                                                                                                                                          Entropy (8bit):4.864308662322047
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290RRKl290ppv:MByMYbpwt290V90b
                                                                                                                                                                                          MD5:21D152A2359A4EFDE6DCC304F16096F3
                                                                                                                                                                                          SHA1:961B3CFB351615604981114A115D396D1F2006A2
                                                                                                                                                                                          SHA-256:46A236EC38F3A122D414208328A462B2A937392ECC6C55F673FB7A402F118D96
                                                                                                                                                                                          SHA-512:04A2AD6DDC2E7B0D3F95DA1C731FF553F8CBC0DD6BDFC36FB2EDCE755612103E3B4EA6F3AB7FE63CA60976538EFABF40827539DFC35B7E83129BD48471FE514B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Tortola) $TZData(:America/Puerto_Rico)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):9815
                                                                                                                                                                                          Entropy (8bit):3.8481935495337356
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:sOR864CjSAG5a9bFzN6IkWq/WHQt/RY4yP:sO664CjSAGYbGBt/M
                                                                                                                                                                                          MD5:9423BC81647BC4C37888860CE0518BBB
                                                                                                                                                                                          SHA1:37E6E6554576D1DD36C3494EAF0BD169003D870D
                                                                                                                                                                                          SHA-256:00B5FB8F37DFF43925C501AEAB039F39F058E002572C4203286317046CC1D700
                                                                                                                                                                                          SHA-512:1830CA2B62B7CA6EEB5A924D2148925DF7DD87A7B93B21F4F023E4678EF42DC20BFF57F702923E10F4382FE6757323D21414D094E99FEEB43316DE4A7E5A909E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Vancouver) {.. {-9223372036854775808 -29548 0 LMT}.. {-2713880852 -28800 0 PST}.. {-1632060000 -25200 1 PDT}.. {-1615129200 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-747237600 -25200 1 PDT}.. {-733935600 -28800 0 PST}.. {-715788000 -25200 1 PDT}.. {-702486000 -28800 0 PST}.. {-684338400 -25200 1 PDT}.. {-671036400 -28800 0 PST}.. {-652888800 -25200 1 PDT}.. {-639586800 -28800 0 PST}.. {-620834400 -25200 1 PDT}.. {-608137200 -28800 0 PST}.. {-589384800 -25200 1 PDT}.. {-576082800 -28800 0 PST}.. {-557935200 -25200 1 PDT}.. {-544633200 -28800 0 PST}.. {-526485600 -25200 1 PDT}.. {-513183600 -28800 0 PST}.. {-495036000 -25200 1 PDT}.. {-481734000 -28800 0 PST}.. {-463586400 -25200 1 PDT}.. {-450284400 -28800 0 PST}.. {-431532000 -25200 1 PDT}.. {-418230000 -28800 0 PST}.. {-4
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):200
                                                                                                                                                                                          Entropy (8bit):4.914983069791254
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7p5oeSHAIgppON/290RXgr490ppv:MByMYbpwt290xg090b
                                                                                                                                                                                          MD5:9F7DA15BE387B8F7DEC5DFFE069F3505
                                                                                                                                                                                          SHA1:D298B963B0048E9ECA3BC7B85248506AB1388479
                                                                                                                                                                                          SHA-256:561D9D04B0CE0F96A9C351C7D5C30AA1D5A42A3D70066CD9AF0DA6CBC5388DBE
                                                                                                                                                                                          SHA-512:606C2A918633C74BD2954D39B00EFA2CD9DA852BC7034F129A04258A65DC74942FA0826E9BC6E4433926E7F1375612554B04845077E434D0CD3BD15832DC6B95
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:America/Virgin) $TZData(:America/Puerto_Rico)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2971
                                                                                                                                                                                          Entropy (8bit):3.9652694533791917
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5CeFvmpn4nRfngnSSXRwEg7MkwY7Twbg7Uwr70vwHg7b6wa7gAHwc7/wzZg7ywJP:5BmCKpj/AOZFCARCeQbvb5wxMN6Ix
                                                                                                                                                                                          MD5:2F2D39B5FB844E170FA7B6AF11B948CA
                                                                                                                                                                                          SHA1:3D89672134D979FCF65225A58249380D9C8A4A65
                                                                                                                                                                                          SHA-256:8E0BC71BD7146145DDE3C064AE205DF08124FE2402853A9655B0EB799E90F31F
                                                                                                                                                                                          SHA-512:6C046D1133C8CCF697C8FB553A1F539948F71FA80BA447B87AA8D1D1D7113B32A6B764C5C1734C615319A27961B6116FCA087EB571869119BE87656FCA351498
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Whitehorse) {.. {-9223372036854775808 -32412 0 LMT}.. {-2188997988 -32400 0 YST}.. {-1632056400 -28800 1 YDT}.. {-1615125600 -32400 0 YST}.. {-1596978000 -28800 1 YDT}.. {-1583164800 -32400 0 YST}.. {-880203600 -28800 1 YWT}.. {-769395600 -28800 1 YPT}.. {-765381600 -32400 0 YST}.. {-147884400 -25200 1 YDDT}.. {-131554800 -32400 0 YST}.. {315561600 -28800 0 PST}.. {325677600 -25200 1 PDT}.. {341398800 -28800 0 PST}.. {357127200 -25200 1 PDT}.. {372848400 -28800 0 PST}.. {388576800 -25200 1 PDT}.. {404902800 -28800 0 PST}.. {420026400 -25200 1 PDT}.. {436352400 -28800 0 PST}.. {452080800 -25200 1 PDT}.. {467802000 -28800 0 PST}.. {483530400 -25200 1 PDT}.. {499251600 -28800 0 PST}.. {514980000 -25200 1 PDT}.. {530701200 -28800 0 PST}.. {544615200 -25200 1 PDT}.. {562150800 -28800 0 PST}.. {576064800 -25200 1 PDT}.. {594205200 -28800
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):9695
                                                                                                                                                                                          Entropy (8bit):3.8209220355628766
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:pOEhc8/rvNZONqXXyIjNA604qSScBgN+4ctDzIVQ/c/3hNxTh:pY8DvbO+A604qSBgI7DBch
                                                                                                                                                                                          MD5:E8DB00D2B99B308018F4F5E48AC47C3A
                                                                                                                                                                                          SHA1:8841467CB264DC9F87FABAADBE90EE2C8DACC80F
                                                                                                                                                                                          SHA-256:F3FC5F6D93D1D9EB0F3DED33873F33C47F841797D96439966F8E0A5A189941FA
                                                                                                                                                                                          SHA-512:5D684B07332ED53F9F8CB71FFF3B6D0F848426A5E4D9E7DA84E49E358C666F1C3BB9CF21352D939B35B558FC691839E24BC84656317F73C768B474AF5AC480EB
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Winnipeg) {.. {-9223372036854775808 -23316 0 LMT}.. {-2602258284 -21600 0 CST}.. {-1694368800 -18000 1 CDT}.. {-1681671600 -21600 0 CST}.. {-1632067200 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1029686400 -18000 1 CDT}.. {-1018198800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-746035200 -18000 1 CDT}.. {-732733200 -21600 0 CST}.. {-715795200 -18000 1 CDT}.. {-702493200 -21600 0 CST}.. {-684345600 -18000 1 CDT}.. {-671043600 -21600 0 CST}.. {-652896000 -18000 1 CDT}.. {-639594000 -21600 0 CST}.. {-620755200 -18000 1 CDT}.. {-607626000 -21600 0 CST}.. {-589392000 -18000 1 CDT}.. {-576090000 -21600 0 CST}.. {-557942400 -18000 1 CDT}.. {-544640400 -21600 0 CST}.. {-526492800 -18000 1 CDT}.. {-513190800 -21600 0 CST}.. {-495043200 -18000 1 CDT}.. {-481741200 -21600 0 CST}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8683
                                                                                                                                                                                          Entropy (8bit):3.957710943557426
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:po1acs6yyyxC9+j1giaJCUbtp0nFI+g/iexpCVaBnNnt61nctE1:p4acsW9DiaJCUbPI+D/iMpCIBSuk
                                                                                                                                                                                          MD5:18EC35FCEC15CE9304818E22222411EF
                                                                                                                                                                                          SHA1:F4A04B3E2B5F55C9582F578C3142E706C4EB6BD6
                                                                                                                                                                                          SHA-256:79B44F245D86A4EC299D1A9A2EDB2AB92D50AB5A7C1C03759D283AC4070F9005
                                                                                                                                                                                          SHA-512:40AC47AC278DF22C7ECFF568456E7C3767B38701B9A2E2639C2201DC53CDD794CF7521BCB773A8AF2A8D4A034D3BBD35BF9788FB5B4E4D51A7A139B3B3353479
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Yakutat) {.. {-9223372036854775808 52865 0 LMT}.. {-3225223727 -33535 0 LMT}.. {-2188953665 -32400 0 YST}.. {-883580400 -32400 0 YST}.. {-880203600 -28800 1 YWT}.. {-769395600 -28800 1 YPT}.. {-765381600 -32400 0 YST}.. {-757350000 -32400 0 YST}.. {-31503600 -32400 0 YST}.. {-21474000 -28800 1 YDT}.. {-5752800 -32400 0 YST}.. {9975600 -28800 1 YDT}.. {25696800 -32400 0 YST}.. {41425200 -28800 1 YDT}.. {57751200 -32400 0 YST}.. {73479600 -28800 1 YDT}.. {89200800 -32400 0 YST}.. {104929200 -28800 1 YDT}.. {120650400 -32400 0 YST}.. {126702000 -28800 1 YDT}.. {152100000 -32400 0 YST}.. {162385200 -28800 1 YDT}.. {183549600 -32400 0 YST}.. {199278000 -28800 1 YDT}.. {215604000 -32400 0 YST}.. {230727600 -28800 1 YDT}.. {247053600 -32400 0 YST}.. {262782000 -28800 1 YDT}.. {278503200 -32400 0 YST}.. {294231600 -28800 1 YDT}.. {30995
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7737
                                                                                                                                                                                          Entropy (8bit):3.8656193813344064
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:42GaLV911sF7Lv/PCewtA8CzSPyDLbrcUia:uPlLv/PCenJzS6cy
                                                                                                                                                                                          MD5:A7606AE597027C26BC90702B2BCC80E9
                                                                                                                                                                                          SHA1:7B2AB2E0A23B8D770D1305A171DBCCE2D471EF2F
                                                                                                                                                                                          SHA-256:B33838F12640C64BA4F10F50657EC4D8D5B30FD226DA4ACA21B169B53AD30576
                                                                                                                                                                                          SHA-512:B18711B4110D6DB0CC7A6EF66639E1B38323F0B61DA4F5287A51BC9EC8534133568C6D3E4F18F6328564DAD291E0CA707768DE4478DD502A40FFD189C08114A1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:America/Yellowknife) {.. {-9223372036854775808 0 0 -00}.. {-1104537600 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-147891600 -18000 1 MDDT}.. {-131562000 -25200 0 MST}.. {315558000 -25200 0 MST}.. {325674000 -21600 1 MDT}.. {341395200 -25200 0 MST}.. {357123600 -21600 1 MDT}.. {372844800 -25200 0 MST}.. {388573200 -21600 1 MDT}.. {404899200 -25200 0 MST}.. {420022800 -21600 1 MDT}.. {436348800 -25200 0 MST}.. {452077200 -21600 1 MDT}.. {467798400 -25200 0 MST}.. {483526800 -21600 1 MDT}.. {499248000 -25200 0 MST}.. {514976400 -21600 1 MDT}.. {530697600 -25200 0 MST}.. {544611600 -21600 1 MDT}.. {562147200 -25200 0 MST}.. {576061200 -21600 1 MDT}.. {594201600 -25200 0 MST}.. {607510800 -21600 1 MDT}.. {625651200 -25200 0 MST}.. {638960400 -21600 1 MDT}.. {657100800 -25200 0 MST}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):478
                                                                                                                                                                                          Entropy (8bit):4.205595904143294
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2L09xSDm2OHE5QMFUH+KNUoTVsBEE0ZZICxZbDtVby:MB862LcUmdHE5QMFi+KdTVPZIwXDy
                                                                                                                                                                                          MD5:7D8132A23238C14CCEDD520BBEB49F77
                                                                                                                                                                                          SHA1:A8BAE9269DAA2AC535B292E1AE8632B451A0BBA5
                                                                                                                                                                                          SHA-256:04247ACB2B4FA126D13F4573FF74D15A89CF42B2C5CD7E688D5BB1C1FD3972BF
                                                                                                                                                                                          SHA-512:74FCB14037B0AE11A95B036791D69037590F8EC7F09D90A866E6A6CAAD6D58E4EC3723A3BB356FBF0E25ED1239A5820A8513EBF6653578E4BFB8988D6D20EF13
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Casey) {.. {-9223372036854775808 0 0 -00}.. {-31536000 28800 0 +08}.. {1255802400 39600 0 +11}.. {1267714800 28800 0 +08}.. {1319738400 39600 0 +11}.. {1329843600 28800 0 +08}.. {1477065600 39600 0 +11}.. {1520701200 28800 0 +08}.. {1538856000 39600 0 +11}.. {1552752000 28800 0 +08}.. {1570129200 39600 0 +11}.. {1583596800 28800 0 +08}.. {1601740860 39600 0 +11}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):324
                                                                                                                                                                                          Entropy (8bit):4.360007144607037
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2L0mDm2OHEfwz0/MVSYyF/KZ7VoX/MVSYyF/VpVQVF9RXhNXSMVSYy6:MB862LVmdHEIjsF/KZOksF/Vp6v9RRFl
                                                                                                                                                                                          MD5:97AA556F7EF06786B76316133794F4E9
                                                                                                                                                                                          SHA1:B3CDA284DE80987B954E2CC9BFA3ED33462CDD4F
                                                                                                                                                                                          SHA-256:2F36D2E13D7E251322B7A7B30F39645393525CEB49A2B5C26F27797F2AAF4D7F
                                                                                                                                                                                          SHA-512:14C6F17252C2AC89D86FE00BD8A8934D627C85478B0AB08AB6237988922D18616B00878498FFFC0E1978308BC6D775E2DC3ADCEF827AB0A06B214BE4DDABAB52
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Davis) {.. {-9223372036854775808 0 0 -00}.. {-409190400 25200 0 +07}.. {-163062000 0 0 -00}.. {-28857600 25200 0 +07}.. {1255806000 18000 0 +05}.. {1268251200 25200 0 +07}.. {1319742000 18000 0 +05}.. {1329854400 25200 0 +07}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):214
                                                                                                                                                                                          Entropy (8bit):4.938579775653117
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3yci/452HAIgObi/4oA6N/2L0/3Zp5/4pv:MByMdNXiU5t2Lkwv
                                                                                                                                                                                          MD5:CC22302B9FAE52E36A2A35C0361E774B
                                                                                                                                                                                          SHA1:45CFD95A5821C4C4FDF2E1519F08029FF0BE664B
                                                                                                                                                                                          SHA-256:96F2AB9A9FFCD10598FDF105F68460CC4B4EBC1F18054D1BC8E39DF6AD24D1AC
                                                                                                                                                                                          SHA-512:FC9084D7B16EAA985681762F2658D32C77EE186D8D3C7225093CC5CB4A6AEB74A3D0A41A904EB6C8AEF7DB110A89497BAFAF811BBC26103F96E5E1D4D4E1002A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Port_Moresby)]} {.. LoadTimeZoneFile Pacific/Port_Moresby..}..set TZData(:Antarctica/DumontDUrville) $TZData(:Pacific/Port_Moresby)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8447
                                                                                                                                                                                          Entropy (8bit):3.850137279218428
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:s1qigkx6WsYyS391QiAmcO38EJ8i/V9cYgCqMEjKeIZ3wQb25Ly04:s1q05h1QiAmcOM6e0pj
                                                                                                                                                                                          MD5:81C612A1544910544173687C416841C6
                                                                                                                                                                                          SHA1:4A707B403F0B9556A3D3D50B08BE0F56660F3F0B
                                                                                                                                                                                          SHA-256:C4EA7F1C0B5A0FAE653419F1C6D058BDDD745A3CDBA11900005C157DF23DDC01
                                                                                                                                                                                          SHA-512:122E2DC3D8D61CCDB83E03C9487DD29AABE7AB3F71FE4F6315209AF0BBCFD01FBDC3A1E3F6D910FB0D690378DF852170A9819D8C1EF96BE6BC8C0811BFB453A9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Macquarie) {.. {-9223372036854775808 0 0 -00}.. {-2214259200 36000 0 AEST}.. {-1680508800 39600 1 AEDT}.. {-1669892400 39600 0 AEDT}.. {-1665388800 36000 0 AEST}.. {-1601719200 0 0 -00}.. {-94730400 36000 0 AEST}.. {-71136000 39600 1 AEDT}.. {-55411200 36000 0 AEST}.. {-37267200 39600 1 AEDT}.. {-25776000 36000 0 AEST}.. {-5817600 39600 1 AEDT}.. {5673600 36000 0 AEST}.. {25632000 39600 1 AEDT}.. {37728000 36000 0 AEST}.. {57686400 39600 1 AEDT}.. {67968000 36000 0 AEST}.. {89136000 39600 1 AEDT}.. {100022400 36000 0 AEST}.. {120585600 39600 1 AEDT}.. {131472000 36000 0 AEST}.. {152035200 39600 1 AEDT}.. {162921600 36000 0 AEST}.. {183484800 39600 1 AEDT}.. {194976000 36000 0 AEST}.. {215539200 39600 1 AEDT}.. {226425600 36000 0 AEST}.. {246988800 39600 1 AEDT}.. {257875200 36000 0 AEST}.. {278438400 39600 1 AEDT}.. {28932480
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):180
                                                                                                                                                                                          Entropy (8bit):4.7511104559982
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/2L0GRHEzyeyFNMXGm2OHvavFeVU/VPKVVFSTVF9svUX0VQr:SlSWB9eg/2L0zyfXDm2OHEVy/Ur9s/Vg
                                                                                                                                                                                          MD5:7A2AD9BD8F8DEE5C600CABF2D5E9D07B
                                                                                                                                                                                          SHA1:CF5D230A29946B7FA3ECD8EB99F1EF1BF0FA5B50
                                                                                                                                                                                          SHA-256:ACA533B8BC82296373EDEC82F6E0AA45A34D817C7C18FF5E8E94B81C0BD30259
                                                                                                                                                                                          SHA-512:95F8FA68735E88AB15C403191928FA4AA5D1628453BE64B87EE7E8DF9F35FB5DA74A3CED5F5289A13D84A8A12BBB86734E578059CA8B6405399CFF5E33C9384C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Mawson) {.. {-9223372036854775808 0 0 -00}.. {-501206400 21600 0 +06}.. {1255809600 18000 0 +05}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):195
                                                                                                                                                                                          Entropy (8bit):4.880387042335617
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3ycqXHAIgObOvRN/2L0z6/fy:MByMdTiYt2LrK
                                                                                                                                                                                          MD5:88EE32AE5C538AEBFDE2D1D944ED5B2B
                                                                                                                                                                                          SHA1:55E7234E6FFF298182A6C8889A9F506CDCE7C959
                                                                                                                                                                                          SHA-256:E9D99293C5B275D8E0D7B066084177EDF670D5B52B81E87608BAB02025F33155
                                                                                                                                                                                          SHA-512:45A3EA146CA719BA6F22E99EAA57AC1DED1C762E19BDFBA176E5FEAC36EC58586F771572DD16ACE09E660F97DEB91A701BA1B1F1AEF3BD8688F3451C0772420A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Auckland)]} {.. LoadTimeZoneFile Pacific/Auckland..}..set TZData(:Antarctica/McMurdo) $TZData(:Pacific/Auckland)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2613
                                                                                                                                                                                          Entropy (8bit):3.6082359166067905
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5fzJS6S4wRSenSOaf7HSKSkSqS7STslSmSMSCSxygSiXS/SrS+S9SfShS7SoSlSL:jdeRtnxaf7HlPlgiot7JC/Xk8NWse4rf
                                                                                                                                                                                          MD5:BDFA5908E735F866FEC16F6B481AD385
                                                                                                                                                                                          SHA1:524AEE21BB97D923A8812A5722AF2FEA43B4D971
                                                                                                                                                                                          SHA-256:1637381A20E9D5C6A530F110BDB08D9515E675C9206F000407D8511074948E61
                                                                                                                                                                                          SHA-512:3D65C7941BA15A698264848F9B6F43ED5B63D4CF86D495334E8E1DC381D63435E9424BBBC389229693D20044FDB8425A7CC805AB5EA055F59D3E0DD4C7AC2A28
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Palmer) {.. {-9223372036854775808 0 0 -00}.. {-157766400 -14400 0 -04}.. {-152654400 -14400 0 -04}.. {-132955200 -10800 1 -04}.. {-121122000 -14400 0 -04}.. {-101419200 -10800 1 -04}.. {-86821200 -14400 0 -04}.. {-71092800 -10800 1 -04}.. {-54766800 -14400 0 -04}.. {-39038400 -10800 1 -04}.. {-23317200 -14400 0 -04}.. {-7588800 -10800 0 -03}.. {128142000 -7200 1 -03}.. {136605600 -10800 0 -03}.. {389070000 -14400 0 -04}.. {403070400 -10800 1 -04}.. {416372400 -14400 0 -04}.. {434520000 -10800 1 -04}.. {447822000 -14400 0 -04}.. {466574400 -10800 1 -04}.. {479271600 -14400 0 -04}.. {498024000 -10800 1 -04}.. {510721200 -14400 0 -04}.. {529473600 -10800 1 -04}.. {545194800 -14400 0 -04}.. {560923200 -10800 1 -04}.. {574225200 -14400 0 -04}.. {592372800 -10800 1 -04}.. {605674800 -14400 0 -04}.. {624427200 -10800 1 -04}.. {63712
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):151
                                                                                                                                                                                          Entropy (8bit):4.829975802206526
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/2L0GRHEsKRsMXGm2OHvavFN/H3VVFVGAvFv:SlSWB9eg/2L0rRsDm2OHEN/VVFAKV
                                                                                                                                                                                          MD5:C330982049AA053DA62B926627D2F2FA
                                                                                                                                                                                          SHA1:050CE68265F1A183F0173C825AC59EAE8B6AB9EB
                                                                                                                                                                                          SHA-256:943F10D8E836773F0B7ACD13ED8422C0B27813C7BBE0B09B57697D1D70D21ECE
                                                                                                                                                                                          SHA-512:DE9953D0E505D6B110C0CC4E756B5B0311646C9CA4703A33B92147D36CFB4C288D73851E6766CE1432F41AB51B5D0A1D58680BDB4E28F067E1D36F670B4A192E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Rothera) {.. {-9223372036854775808 0 0 -00}.. {218246400 -10800 0 -03}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):198
                                                                                                                                                                                          Entropy (8bit):4.906125935761354
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3ycqXHAIgObOvRN/2L0tlo+ply:MByMdTiYt2LMq+p8
                                                                                                                                                                                          MD5:8095A3749DBDE05377836D74A4EEFE33
                                                                                                                                                                                          SHA1:6987CA972B63AE26A65654961588D51D3EF2166C
                                                                                                                                                                                          SHA-256:88057832175BB642B23FC99F788A2F78A24005CF1F84A7B1B5E8C84FB8F4D4C1
                                                                                                                                                                                          SHA-512:9066104C9C16D2AB88523D651C74CE268468E093A497D128D0D12A986BD62DBC1388A56ED1737C2AFACF04185CF06FD0EE66797A3390B2F0E1EB08A4D92AAFAD
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Auckland)]} {.. LoadTimeZoneFile Pacific/Auckland..}..set TZData(:Antarctica/South_Pole) $TZData(:Pacific/Auckland)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):178
                                                                                                                                                                                          Entropy (8bit):4.871844665431957
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8t14XHAIgNsM13oOARL/2L0GRHEtWlFBQWFK81Fn:SlSWB9vsM3yN14HAIgaM1YOAN/2L0tQB
                                                                                                                                                                                          MD5:CA52057130DCF506D11A7CC069F4FBA3
                                                                                                                                                                                          SHA1:2C38B7E7872BB41C3569DFCB539C3EC3AAE24FDD
                                                                                                                                                                                          SHA-256:2488805DE4FEA42305689F679F1AE2D80B1E934E657FEA329AD39A82DAC63022
                                                                                                                                                                                          SHA-512:B19D409870939C8F0834C6C028239E010EE5128DFA6E97D4903BECA229B04FE530EA376B936767D9BFE21709720C1791289D8E3622B17C18F2680B0670794A02
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Riyadh)]} {.. LoadTimeZoneFile Asia/Riyadh..}..set TZData(:Antarctica/Syowa) $TZData(:Asia/Riyadh)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):5370
                                                                                                                                                                                          Entropy (8bit):3.5134546899897146
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:YveRdmbxnKIJqU9XThVIsopb8BcrFgoZVlzeEG+PtJ:UeRdmNnKIIajfopb3FVVJ
                                                                                                                                                                                          MD5:442F495C36B31CA5D7A9BEFF12105AEF
                                                                                                                                                                                          SHA1:B3F6CA5B4A5756F9B2C09A27198F7A651CC6032D
                                                                                                                                                                                          SHA-256:6FD5AB8B7B308CDCEA4B747A81D8675988AE218813C91714FC4CA97919CEBEA5
                                                                                                                                                                                          SHA-512:C6EAECC26D67D218615EBB5602639DAB62A2578BD9683553D765DC1AC5580627D29B6F911388F5F1BFC284278EA4EBECE94630D3C6B95FF9EF93D3D61A3C2028
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Troll) {.. {-9223372036854775808 0 0 -00}.. {1108166400 0 0 +00}.. {1111885200 7200 1 +02}.. {1130634000 0 0 +00}.. {1143334800 7200 1 +02}.. {1162083600 0 0 +00}.. {1174784400 7200 1 +02}.. {1193533200 0 0 +00}.. {1206838800 7200 1 +02}.. {1224982800 0 0 +00}.. {1238288400 7200 1 +02}.. {1256432400 0 0 +00}.. {1269738000 7200 1 +02}.. {1288486800 0 0 +00}.. {1301187600 7200 1 +02}.. {1319936400 0 0 +00}.. {1332637200 7200 1 +02}.. {1351386000 0 0 +00}.. {1364691600 7200 1 +02}.. {1382835600 0 0 +00}.. {1396141200 7200 1 +02}.. {1414285200 0 0 +00}.. {1427590800 7200 1 +02}.. {1445734800 0 0 +00}.. {1459040400 7200 1 +02}.. {1477789200 0 0 +00}.. {1490490000 7200 1 +02}.. {1509238800 0 0 +00}.. {1521939600 7200 1 +02}.. {1540688400 0 0 +00}.. {1553994000 7200 1 +02}.. {1572138000 0 0 +00}.. {1585443600 7200 1 +02}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):150
                                                                                                                                                                                          Entropy (8bit):4.825276519494304
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/2L0GRHEoKcMFPMXGm2OHvavFYd/bVFXKVVFSTVVn:SlSWB9eg/2L0XcMFPDm2OHEsVFXK/UX
                                                                                                                                                                                          MD5:EEF1A803C78FEDC2848A967F8F7C8C28
                                                                                                                                                                                          SHA1:AC0E8008EFE4EF1A393478C82724335EA30BF1CD
                                                                                                                                                                                          SHA-256:1EFDAE8A23BA4EE37E7992F3C9DCADA6C2E95AF82A955A4C6597E7295C950855
                                                                                                                                                                                          SHA-512:F19EA119EA4F354099402FDEEAAA551AA2C5FC1295E40B5A82E5896CB41F0C86AD8CAA86FDC4E7BD30AAF0ABAF2794FE7B177C4FE25A89F1C744C400A140AA88
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Antarctica/Vostok) {.. {-9223372036854775808 0 0 -00}.. {-380073600 21600 0 +06}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):181
                                                                                                                                                                                          Entropy (8bit):4.968479138333469
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVyWJooeyXHAIgoqxWJz5RL/2XbeLo4cA4FH/h8Qas:SlSWB9vsM3ymSDSHAIgoXN/2XbUyAK8K
                                                                                                                                                                                          MD5:3FE28E22313BA8C8100254644DBFD164
                                                                                                                                                                                          SHA1:46F917F0E706CD072B89C06652DAA032CD67AD98
                                                                                                                                                                                          SHA-256:944A38702A5176A082755897F1E4B1C88D5721CB499245E2FE51D2CFD849A23F
                                                                                                                                                                                          SHA-512:BF6E42C039C780EB62CFD69B0375EFF9D459E6468CAFE2323A086D2EB2039B97F805BC361962C72F51F527E96B51973298F13774427E38A28E851A9D19664820
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Oslo)]} {.. LoadTimeZoneFile Europe/Oslo..}..set TZData(:Arctic/Longyearbyen) $TZData(:Europe/Oslo)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):171
                                                                                                                                                                                          Entropy (8bit):4.829666491766117
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8t14XHAIgNsM13oOARL/2WFK4h4WFK81Fn:SlSWB9vsM3yN14HAIgaM1YOAN/2wKs46
                                                                                                                                                                                          MD5:60D7F3194F19179E0CF0F561F9C40EE6
                                                                                                                                                                                          SHA1:B079EC49485CFBFFB7A5BE6149319B75684258E9
                                                                                                                                                                                          SHA-256:8FCDDB246932BAED880B70C0CA867057E7989AEA55EDDC174430E1055CD1058D
                                                                                                                                                                                          SHA-512:0BDC86B1D473D4875C6F7C092F955D0999E6C1F2EF83CFC7726A3C5BFEB0F5CB8E00B1F0CBC1F91F806EC635C472927504DF681A32DAC55EF372DA16FEA9EF40
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Riyadh)]} {.. LoadTimeZoneFile Asia/Riyadh..}..set TZData(:Asia/Aden) $TZData(:Asia/Riyadh)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1637
                                                                                                                                                                                          Entropy (8bit):3.732051305399264
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5qehddmvOt81FCuLqecDngO6jPvTpYy5T4TXvKT10SvPFu+a+CK/Eu3CWuD0Vob1:5YvdJqxiF0rvK50Sv9fGSM
                                                                                                                                                                                          MD5:D6BCB21F65642F36A159AFD72EC93953
                                                                                                                                                                                          SHA1:D3E670E579924E6E4F04AB574D48334FF521D8B2
                                                                                                                                                                                          SHA-256:06DC608C0B8CDD69CCE66A6BF86F141C46DF39CB45312E684E46F19ED8CAFF15
                                                                                                                                                                                          SHA-512:9A633B629873E5EE5AF923A94865EBE5FD9ECA181B2C47B7368A0828468715E07AD3FD825D5E2312D2D0BA1FA5490E3817C36B6339824C8012A0B75538C4A0DC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Almaty) {.. {-9223372036854775808 18468 0 LMT}.. {-1441170468 18000 0 +05}.. {-1247547600 21600 0 +06}.. {354909600 25200 1 +06}.. {370717200 21600 0 +06}.. {386445600 25200 1 +06}.. {402253200 21600 0 +06}.. {417981600 25200 1 +06}.. {433789200 21600 0 +06}.. {449604000 25200 1 +06}.. {465336000 21600 0 +06}.. {481060800 25200 1 +06}.. {496785600 21600 0 +06}.. {512510400 25200 1 +06}.. {528235200 21600 0 +06}.. {543960000 25200 1 +06}.. {559684800 21600 0 +06}.. {575409600 25200 1 +06}.. {591134400 21600 0 +06}.. {606859200 25200 1 +06}.. {622584000 21600 0 +06}.. {638308800 25200 1 +06}.. {654638400 21600 0 +06}.. {670363200 18000 0 +05}.. {670366800 21600 1 +05}.. {686091600 18000 0 +05}.. {695768400 21600 0 +06}.. {701812800 25200 1 +06}.. {717537600 21600 0 +06}.. {733262400 25200 1 +06}.. {748987200 21600 0 +06}.. {764712
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7301
                                                                                                                                                                                          Entropy (8bit):3.7085177447035047
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:Fz0T52akyId7+xOXdkwqeIFcvQdaKkIQV9aOBmGILnNoRkEKnFj/XmJmoTSVI:FY85S0VqXFcvQMZUnNrK
                                                                                                                                                                                          MD5:C5521EB658601F0C03F3122A1529B7B9
                                                                                                                                                                                          SHA1:0B0F9BD69F3B49DF5D25A9F567471409D7467ED8
                                                                                                                                                                                          SHA-256:AA5E87C065E5AA4516F1AA50E1840EE22683D3B4C25A4E00CA92C53F96C6D062
                                                                                                                                                                                          SHA-512:B16039183DF4AF64768F4956075E9557988466E4FC327968712958186CB8F804C1F1B0ED80F5EC7900521CC5710E8AA0DD6716C3B58F7B31116E22CB5785C000
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Amman) {.. {-9223372036854775808 8624 0 LMT}.. {-1230776624 7200 0 EET}.. {108165600 10800 1 EEST}.. {118270800 7200 0 EET}.. {136591200 10800 1 EEST}.. {149806800 7200 0 EET}.. {168127200 10800 1 EEST}.. {181342800 7200 0 EET}.. {199749600 10800 1 EEST}.. {215643600 7200 0 EET}.. {231285600 10800 1 EEST}.. {244501200 7200 0 EET}.. {262735200 10800 1 EEST}.. {275950800 7200 0 EET}.. {481154400 10800 1 EEST}.. {496962000 7200 0 EET}.. {512949600 10800 1 EEST}.. {528670800 7200 0 EET}.. {544399200 10800 1 EEST}.. {560120400 7200 0 EET}.. {575848800 10800 1 EEST}.. {592174800 7200 0 EET}.. {610581600 10800 1 EEST}.. {623624400 7200 0 EET}.. {641167200 10800 1 EEST}.. {655074000 7200 0 EET}.. {671839200 10800 1 EEST}.. {685918800 7200 0 EET}.. {702856800 10800 1 EEST}.. {717973200 7200 0 EET}.. {733701600 10800 1 EEST}.. {749422800
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2086
                                                                                                                                                                                          Entropy (8bit):3.7698340044911616
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5DeEdVrEOeFt7YFpR2kHmxCcUdBbcHDLV2vpXt25A0UeRr9ydzkMfF6USRWk9UuV:5ZejsFLrcZwvJt2F+doTr9Q3G80
                                                                                                                                                                                          MD5:6EFC35043BDCA4AB61D72E931DB954E6
                                                                                                                                                                                          SHA1:F0B4E76C154DC773073E41AA8E94030E972A986A
                                                                                                                                                                                          SHA-256:D9DF64FDA4638F7604624B0F68A885D5ABADB1DE12AF1AF5581C2AF7DD971562
                                                                                                                                                                                          SHA-512:16AE582B113D6960C73B64620A8AF20F9D436AA4B3EC8E881617AED3389EB4357931882103F162F19EE8202953A7E6FB4FDD6D7760FB7621F4DB9D229AD13F17
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Anadyr) {.. {-9223372036854775808 42596 0 LMT}.. {-1441194596 43200 0 +12}.. {-1247572800 46800 0 +14}.. {354884400 50400 1 +14}.. {370692000 46800 0 +13}.. {386420400 43200 0 +13}.. {386424000 46800 1 +13}.. {402231600 43200 0 +12}.. {417960000 46800 1 +13}.. {433767600 43200 0 +12}.. {449582400 46800 1 +13}.. {465314400 43200 0 +12}.. {481039200 46800 1 +13}.. {496764000 43200 0 +12}.. {512488800 46800 1 +13}.. {528213600 43200 0 +12}.. {543938400 46800 1 +13}.. {559663200 43200 0 +12}.. {575388000 46800 1 +13}.. {591112800 43200 0 +12}.. {606837600 46800 1 +13}.. {622562400 43200 0 +12}.. {638287200 46800 1 +13}.. {654616800 43200 0 +12}.. {670341600 39600 0 +12}.. {670345200 43200 1 +12}.. {686070000 39600 0 +11}.. {695746800 43200 0 +13}.. {701791200 46800 1 +13}.. {717516000 43200 0 +12}.. {733240800 46800 1 +13}.. {748965
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1665
                                                                                                                                                                                          Entropy (8bit):3.7149890651919644
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5uvFlvNhQQvmRKqv0fvzQIovWdvEGvDaDvs5vZlovKWyvNSvTqvIkhYwr:sFBNKs6b03zB0WJEuDa7sFZiKWaN6TiF
                                                                                                                                                                                          MD5:A72FB1FE01C93BD7E0A8136635C72639
                                                                                                                                                                                          SHA1:2383CF839F50784D4BF8B7EDDB324C80E2DDD0DC
                                                                                                                                                                                          SHA-256:96B510AF9B8C6BC1DFA84E9ED5E072F3FD484EEB66BBEBC7B6826ED859ED9027
                                                                                                                                                                                          SHA-512:061FECE3C750C0229638DD8AF38FB3E8E48E59E0DE1B13BCFE46483A7A170B71B9BCB0D6F110B6B2EF68510FA940F9066F14CBD59829E222D6644D3657CE1893
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Aqtau) {.. {-9223372036854775808 12064 0 LMT}.. {-1441164064 14400 0 +04}.. {-1247544000 18000 0 +05}.. {370724400 21600 0 +06}.. {386445600 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 21600 1 +05}.. {622587600 18000 0 +05}.. {638312400 21600 1 +05}.. {654642000 18000 0 +05}.. {670366800 14400 0 +04}.. {670370400 18000 1 +04}.. {686095200 14400 0 +04}.. {695772000 18000 0 +05}.. {701816400 21600 1 +05}.. {717541200 18000 0 +05}.. {733266000 21600 1 +05}.. {748990800 18000 0 +05}.. {7647156
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1666
                                                                                                                                                                                          Entropy (8bit):3.721746335201775
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5FUvalvNhQQvmRKqv0fvzQIovWdvEGvDaDvs5vZlovKWyvNSvTqvIQvyovklvqQR:PwaBNKs6b03zB0WJEuDa7sFZiKWaN6Tt
                                                                                                                                                                                          MD5:E278B985BD2515DBCAED8CB741BE9208
                                                                                                                                                                                          SHA1:BC9F5E72C430661D7ED1AF04571CE5D0F73DD18D
                                                                                                                                                                                          SHA-256:991638FA2AB2A2F7A091A23D78D99306EE73A740F1A03FBAC448EDCAB55A0E38
                                                                                                                                                                                          SHA-512:9951DB729B837647CC4B3D2E605525DCCBAFFD39D76460331BF62235DCAE5E4470CDA578F940B1739AABFEC55D293FF60D79AE0EFDFE1EB64E84571881FDEA6A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Aqtobe) {.. {-9223372036854775808 13720 0 LMT}.. {-1441165720 14400 0 +04}.. {-1247544000 18000 0 +05}.. {354913200 21600 1 +06}.. {370720800 21600 0 +06}.. {386445600 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 21600 1 +05}.. {622587600 18000 0 +05}.. {638312400 21600 1 +05}.. {654642000 18000 0 +05}.. {670366800 14400 0 +04}.. {670370400 18000 1 +04}.. {686095200 14400 0 +04}.. {695772000 18000 0 +05}.. {701816400 21600 1 +05}.. {717541200 18000 0 +05}.. {733266000 21600 1 +05}.. {748990
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):878
                                                                                                                                                                                          Entropy (8bit):3.937249024843323
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5ggeRMdIQvNcDvNhQQvmRKqvzQfv7PQIovWxrvEGvDWdDvs5v/RlovKTob3CGcr:5gbkvNSvNhQQvmRKqv0fvzQIovWdvEGD
                                                                                                                                                                                          MD5:259179C7A1CA04F9F3A373B6C8FCB8C5
                                                                                                                                                                                          SHA1:D042DF8EFD8EC1473B45B1131BD5EB714F1B2C17
                                                                                                                                                                                          SHA-256:13745BFA25E6E2D8D0FABAE42CB7C37CF9F974CFB343D4FE84E4E2D64A25926B
                                                                                                                                                                                          SHA-512:703BEAD5A1E5B3816D98057A08A87C2139F418787F38561FE35175B84E2005365727F85D1B949CC5DF464B207A7D01BB65FB1A632E73DDA523E843B82D76FBBD
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Ashgabat) {.. {-9223372036854775808 14012 0 LMT}.. {-1441166012 14400 0 +04}.. {-1247544000 18000 0 +05}.. {354913200 21600 1 +05}.. {370720800 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 21600 1 +05}.. {622587600 18000 0 +05}.. {638312400 21600 1 +05}.. {654642000 18000 0 +05}.. {670366800 14400 0 +04}.. {670370400 18000 1 +04}.. {686095200 14400 0 +04}.. {695772000 18000 0 +05}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):182
                                                                                                                                                                                          Entropy (8bit):4.801820439218014
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8xEYM4DyXHAIgN/ZEYovFvWARL/2WFKUNSH+WFKYEQ:SlSWB9vsM3yR+HAIgH8VWAN/2wKUNSeq
                                                                                                                                                                                          MD5:5193EF7ADB646798801245BC50C8DDA6
                                                                                                                                                                                          SHA1:83ED851CBC60EFB330A8FC119E1BED5B4C0BA630
                                                                                                                                                                                          SHA-256:2C752F641B98E3C05B14AE31330D1F198DAA4A7E354BA9670C7754926BFB891A
                                                                                                                                                                                          SHA-512:E940E1BE67A9AC895F3D060B1CB34797A429147A9DC2AC0F1162D37D86661EF217EDABA720F0AE3796186FE801229210AC785BB4511CBBE5A41791D236101D8C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Ashgabat)]} {.. LoadTimeZoneFile Asia/Ashgabat..}..set TZData(:Asia/Ashkhabad) $TZData(:Asia/Ashgabat)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1666
                                                                                                                                                                                          Entropy (8bit):3.7265766742957402
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:55TvFlvNhQQvmRKqv0fvzQIovWdvEGvDaDvs5vZlovKWyvNSvTqvIQvyovklvqQJ:XrFBNKs6b03zB0WJEuDa7sFZiKWaN6Tl
                                                                                                                                                                                          MD5:0236793F90ABC6F68718DDBB44AF5E2F
                                                                                                                                                                                          SHA1:A5EFAEEF9B9159E748A3FED231F8A978E400482E
                                                                                                                                                                                          SHA-256:4B7B118E6AE72D41740CF0CB2BD8E970700758DCBC0DD6F298199D841DF8408E
                                                                                                                                                                                          SHA-512:851C7A9C110790454312BB9C5B5D3C426365EEF4673191B9ABB2E4A32301894C5FB1ADCBE2A4C67BEE416AD63FB8BED85F94EF9BF42473DA4BFFA7824935A1D5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Atyrau) {.. {-9223372036854775808 12464 0 LMT}.. {-1441164464 10800 0 +03}.. {-1247540400 18000 0 +05}.. {370724400 21600 0 +06}.. {386445600 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 21600 1 +05}.. {622587600 18000 0 +05}.. {638312400 21600 1 +05}.. {654642000 18000 0 +05}.. {670366800 14400 0 +04}.. {670370400 18000 1 +04}.. {686095200 14400 0 +04}.. {695772000 18000 0 +05}.. {701816400 21600 1 +05}.. {717541200 18000 0 +05}.. {733266000 21600 1 +05}.. {748990800 18000 0 +05}.. {764715
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1702
                                                                                                                                                                                          Entropy (8bit):3.7261419515679393
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5/eVvyGiHD6UC4UrUomFMmUZcjbUKNFcUEUvUOpU8MYUWCUlbf/U9bUiUUybUQUF:5m8G9mFdnNF1FfsTuvQXHCe
                                                                                                                                                                                          MD5:690013310A46BD1AE250A5E019353809
                                                                                                                                                                                          SHA1:0DF434C7EEB707DC071007FAB112F4DEB37E936F
                                                                                                                                                                                          SHA-256:D20B75D2604C3B742C1629C5EE02CFF6783E472249982B272B68F2A6DE9BDC38
                                                                                                                                                                                          SHA-512:FF8C33E55E4F006C38D3FD37A1AD3E1200718CA374ECBEAE8255C7635912F0BB23A59A600BF7130D5660A24C515F726E8440D0D908E560CB59F74059638E6AA2
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Baghdad) {.. {-9223372036854775808 10660 0 LMT}.. {-2524532260 10656 0 BMT}.. {-1641005856 10800 0 +03}.. {389048400 14400 0 +03}.. {402264000 10800 0 +03}.. {417906000 14400 1 +03}.. {433800000 10800 0 +03}.. {449614800 14400 1 +03}.. {465422400 10800 0 +03}.. {481150800 14400 1 +03}.. {496792800 10800 0 +03}.. {512517600 14400 1 +03}.. {528242400 10800 0 +03}.. {543967200 14400 1 +03}.. {559692000 10800 0 +03}.. {575416800 14400 1 +03}.. {591141600 10800 0 +03}.. {606866400 14400 1 +03}.. {622591200 10800 0 +03}.. {638316000 14400 1 +03}.. {654645600 10800 0 +03}.. {670464000 14400 1 +03}.. {686275200 10800 0 +03}.. {702086400 14400 1 +03}.. {717897600 10800 0 +03}.. {733622400 14400 1 +03}.. {749433600 10800 0 +03}.. {765158400 14400 1 +03}.. {780969600 10800 0 +03}.. {796694400 14400 1 +03}.. {812505600 10800 0 +03}.. {82831
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):171
                                                                                                                                                                                          Entropy (8bit):4.784355129067593
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8hkXHAIgNvZORL/2WFKENUKMFB/4WFKKB:SlSWB9vsM3yBkHAIgPON/2wKENUr/4wT
                                                                                                                                                                                          MD5:1B5E0D449DAEF469D586A853CB3073AD
                                                                                                                                                                                          SHA1:FD735B0472B31644E787767B82B737CC39EC4175
                                                                                                                                                                                          SHA-256:3D437037FBF2BBDF969C8E71967080947F24860D431B39F5D8F23151316ABCD5
                                                                                                                                                                                          SHA-512:2A2DC33D4258A5E1AE59172883F3B11723798ED35CF5AF1B8BA81A8807DC6F8222C8044D82B152EF6AF43E7350FEB2625D4406C6C7DD309CE65810EA3D3286B6
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Qatar)]} {.. LoadTimeZoneFile Asia/Qatar..}..set TZData(:Asia/Bahrain) $TZData(:Asia/Qatar)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2149
                                                                                                                                                                                          Entropy (8bit):3.6155622322573713
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5/eFdqlykbocXcwJUE5iu8JmFebARoc9lVNk7/9bq8dq16b3C9UPBUTIEjvZJ+76:5RsUf8mFpNWFny1ZGMte3aivUKo
                                                                                                                                                                                          MD5:294DFC98F67AC00A188EC3D3B87C501C
                                                                                                                                                                                          SHA1:93C434CD9AA170E35AD676C88EE09986A94EC02A
                                                                                                                                                                                          SHA-256:873E8F08B87610D0DAFE239D32345248A4595C6B13D1DA83EC214D78E88FA12C
                                                                                                                                                                                          SHA-512:5346082CCA733724C0D2C36B768467E59BA9ED6452B6CF1BA923AF4F0D2BC05C67DB49E804CA81DAD449D30D0835026D708D9AB632D02FDA1EA1A0BF717111DE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Baku) {.. {-9223372036854775808 11964 0 LMT}.. {-1441163964 10800 0 +03}.. {-405140400 14400 0 +04}.. {354916800 18000 1 +04}.. {370724400 14400 0 +04}.. {386452800 18000 1 +04}.. {402260400 14400 0 +04}.. {417988800 18000 1 +04}.. {433796400 14400 0 +04}.. {449611200 18000 1 +04}.. {465343200 14400 0 +04}.. {481068000 18000 1 +04}.. {496792800 14400 0 +04}.. {512517600 18000 1 +04}.. {528242400 14400 0 +04}.. {543967200 18000 1 +04}.. {559692000 14400 0 +04}.. {575416800 18000 1 +04}.. {591141600 14400 0 +04}.. {606866400 18000 1 +04}.. {622591200 14400 0 +04}.. {638316000 18000 1 +04}.. {654645600 14400 0 +04}.. {670370400 10800 0 +03}.. {670374000 14400 1 +03}.. {686098800 10800 0 +03}.. {701823600 14400 1 +03}.. {717548400 14400 0 +04}.. {820440000 14400 0 +04}.. {828234000 18000 1 +05}.. {846378000 14400 0 +04}.. {852062400
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):181
                                                                                                                                                                                          Entropy (8bit):4.911309754748998
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/2WFKELYOiMXGm2OHB+keoHvZKmrROpDovFFsQ+8EXVeVSYe:SlSWB9eg/2wKELeDm2OHxeoHvZ3FO1og
                                                                                                                                                                                          MD5:9AC4947AC29C797055B7EBFA4F6AC710
                                                                                                                                                                                          SHA1:E7758A9A8BFA255F6B2D27F5366D9FE2A26DDF6C
                                                                                                                                                                                          SHA-256:6E72BA908F250FD45D554A12E3E7B3BD2F1C02A6C2431F806FD2A054F843AA90
                                                                                                                                                                                          SHA-512:F9D0F0CB7D3726C2AB3B5049429172D9DD4BA21353F6F98570CBA4EE969F7D97BD973CB165AECFF930AFFA8633E8052624D44EE7FB91763681ED3F78A61F4F98
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Bangkok) {.. {-9223372036854775808 24124 0 LMT}.. {-2840164924 24124 0 BMT}.. {-1570084924 25200 0 +07}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2117
                                                                                                                                                                                          Entropy (8bit):3.7025684250364725
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5VeTtXJfsFN/3sFrOksF/sF7IyksF7FRZsFLsFTsFcsFk73sFK/XCFKTipnFEnsr:5n40yVRB7VfXucdKmtTTDOV
                                                                                                                                                                                          MD5:6CC13B6910412A3A3D16CA36ADF00352
                                                                                                                                                                                          SHA1:061CF4A8FEA8C139F50F96E6B6506B50ED3DD792
                                                                                                                                                                                          SHA-256:992F93A7975F8CD4E94D96B3BA1ECFB3585E52A53F4442A15993402D3F955F66
                                                                                                                                                                                          SHA-512:4E9750B1C3C0BA4F7922BCBC76276A3E74031D78A98E21DC59F66D6EA8E1B70865BBEB50A6B77EB0423421A18428B97B47412053CE15213128CEED669F4DD6E8
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Barnaul) {.. {-9223372036854775808 20100 0 LMT}.. {-1579844100 21600 0 +06}.. {-1247551200 25200 0 +08}.. {354906000 28800 1 +08}.. {370713600 25200 0 +07}.. {386442000 28800 1 +08}.. {402249600 25200 0 +07}.. {417978000 28800 1 +08}.. {433785600 25200 0 +07}.. {449600400 28800 1 +08}.. {465332400 25200 0 +07}.. {481057200 28800 1 +08}.. {496782000 25200 0 +07}.. {512506800 28800 1 +08}.. {528231600 25200 0 +07}.. {543956400 28800 1 +08}.. {559681200 25200 0 +07}.. {575406000 28800 1 +08}.. {591130800 25200 0 +07}.. {606855600 28800 1 +08}.. {622580400 25200 0 +07}.. {638305200 28800 1 +08}.. {654634800 25200 0 +07}.. {670359600 21600 0 +07}.. {670363200 25200 1 +07}.. {686088000 21600 0 +06}.. {695764800 25200 0 +08}.. {701809200 28800 1 +08}.. {717534000 25200 0 +07}.. {733258800 28800 1 +08}.. {748983600 25200 0 +07}.. {76470
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8024
                                                                                                                                                                                          Entropy (8bit):3.7230911686481774
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:4nBKPP8LFH0TDkywaZb1QSCK5VUjiO1PoBQpo7778CZicJZS80EGcLt4Mok1MgJl:4M38LCRZb+sAiO1PoBQpo1ikjD
                                                                                                                                                                                          MD5:1D99E2BBB01B1669403CFBAF7E03F733
                                                                                                                                                                                          SHA1:DBDD58C7FD195FC602C4541D6F416CC96094C121
                                                                                                                                                                                          SHA-256:17AF14646D562AFE17DCCFD1D2FBA95C122F3E0263906A36EB48BFF04ACF233E
                                                                                                                                                                                          SHA-512:98524E8DCD17C090058F17BDA1200D9801EB1B14EB5CEB8C31149A4A402A53BA4923A2AFF457E0A72DAA601D88095247806F945F704000F874FCBF73631DD135
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Beirut) {.. {-9223372036854775808 8520 0 LMT}.. {-2840149320 7200 0 EET}.. {-1570413600 10800 1 EEST}.. {-1552186800 7200 0 EET}.. {-1538359200 10800 1 EEST}.. {-1522551600 7200 0 EET}.. {-1507514400 10800 1 EEST}.. {-1490583600 7200 0 EET}.. {-1473645600 10800 1 EEST}.. {-1460948400 7200 0 EET}.. {-399866400 10800 1 EEST}.. {-386650800 7200 0 EET}.. {-368330400 10800 1 EEST}.. {-355114800 7200 0 EET}.. {-336794400 10800 1 EEST}.. {-323578800 7200 0 EET}.. {-305172000 10800 1 EEST}.. {-291956400 7200 0 EET}.. {-273636000 10800 1 EEST}.. {-260420400 7200 0 EET}.. {78012000 10800 1 EEST}.. {86734800 7200 0 EET}.. {105055200 10800 1 EEST}.. {118270800 7200 0 EET}.. {136591200 10800 1 EEST}.. {149806800 7200 0 EET}.. {168127200 10800 1 EEST}.. {181342800 7200 0 EET}.. {199749600 10800 1 EEST}.. {212965200 7200 0 EET}.. {231285600 10800
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1669
                                                                                                                                                                                          Entropy (8bit):3.7443715330695735
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5qvdJqxiF0rvK5XvV4vUzvCjvT7voPvkPvJUbvn0vYpv99v3uvuWvKJhv3T:Ad1mzK5/VkULCbTjoHkHJUDnQYV9p3mO
                                                                                                                                                                                          MD5:1EE8FF3DF0D931A140ADBB021EB3BFEB
                                                                                                                                                                                          SHA1:F1F15EF70C4E9F456849AF89CAC97AD747D9E192
                                                                                                                                                                                          SHA-256:1D5E9A8F6A04273AF741F648EF10718B004A60D7884FE432DDF85A8F558BEA98
                                                                                                                                                                                          SHA-512:155539A5CF21A34FBFACBF1652D934BF32255F4E505E60B3B4D8B5F2F7FAE552E6CB4824D8608A9C56370F58E48702335995BBD16B7A296A86A72A615FBC8ABC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Bishkek) {.. {-9223372036854775808 17904 0 LMT}.. {-1441169904 18000 0 +05}.. {-1247547600 21600 0 +06}.. {354909600 25200 1 +06}.. {370717200 21600 0 +06}.. {386445600 25200 1 +06}.. {402253200 21600 0 +06}.. {417981600 25200 1 +06}.. {433789200 21600 0 +06}.. {449604000 25200 1 +06}.. {465336000 21600 0 +06}.. {481060800 25200 1 +06}.. {496785600 21600 0 +06}.. {512510400 25200 1 +06}.. {528235200 21600 0 +06}.. {543960000 25200 1 +06}.. {559684800 21600 0 +06}.. {575409600 25200 1 +06}.. {591134400 21600 0 +06}.. {606859200 25200 1 +06}.. {622584000 21600 0 +06}.. {638308800 25200 1 +06}.. {654638400 21600 0 +06}.. {670363200 18000 0 +05}.. {670366800 21600 1 +05}.. {683586000 18000 0 +05}.. {703018800 21600 1 +05}.. {717530400 18000 0 +05}.. {734468400 21600 1 +05}.. {748980000 18000 0 +05}.. {765918000 21600 1 +05}.. {78042
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):182
                                                                                                                                                                                          Entropy (8bit):4.843807524560784
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/2WFKXeAMMkSMXGm2OHCQdvVVoHsWUOVFW/FvOVSSFdaUMWO:SlSWB9eg/2wK0iDm2OHCIvVVoH3UuW/N
                                                                                                                                                                                          MD5:37B0C37CDDEE62E6002AF3D09B0B6225
                                                                                                                                                                                          SHA1:75F1329492C231587FE233175D9B71112DA09B08
                                                                                                                                                                                          SHA-256:A4216B59F2478DE7E88A99E2B11BBBD93070477D7E62BFD453D1CA430EBB4834
                                                                                                                                                                                          SHA-512:6FDC5C74F927970DA261A5842D9647E97163009A2902C8A8AB6DFAACF261485AB179495D2D72FAC513D1A27F662553F1F0EEC8687E009EA5753D5A9E6B0A0D34
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Brunei) {.. {-9223372036854775808 27580 0 LMT}.. {-1383464380 27000 0 +0730}.. {-1167636600 28800 0 +08}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):178
                                                                                                                                                                                          Entropy (8bit):4.774027471796823
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq864DyXHAIgN1QvRL/2WFKh0s+WFKvovn:SlSWB9vsM3ya4DSHAIgcvN/2wKN+wKvy
                                                                                                                                                                                          MD5:8BB098AB77CB0469B1FA0E0B64C4A9E7
                                                                                                                                                                                          SHA1:88C73626985071DD0923E1CAB343ACCD854A7297
                                                                                                                                                                                          SHA-256:1BAEF7850111D2C33B2A766A8AE804534ABA1711BF80A4087A89656DDD8469D5
                                                                                                                                                                                          SHA-512:82216A7F787AF20A4C97C7AA754CD6BE979FEF24137CF9A8B18EECA5E8FBCF12834DD8A6FC9CD2357D807F1629806745B46B11DC0472E0284E18DCCC983897DE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Kolkata)]} {.. LoadTimeZoneFile Asia/Kolkata..}..set TZData(:Asia/Calcutta) $TZData(:Asia/Kolkata)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2086
                                                                                                                                                                                          Entropy (8bit):3.6981807774781017
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5Bpr1gIgWH/lt0irzEzCSCItWiIrW+rDQk9CVhyFY7rRWjYuhUmgr2M:95PhtjLiII2ZFlgd
                                                                                                                                                                                          MD5:69E03A5CEB689E19B60168C0F7EBAE8E
                                                                                                                                                                                          SHA1:95C6396EB753753B4FE4AE1B98D76332523E72A4
                                                                                                                                                                                          SHA-256:10B6F435B05D887176A4D90CA5AC957F327F62F36F15D6F6E4F81844662429B9
                                                                                                                                                                                          SHA-512:DFA72EDC54A11F0840ADBEE7F5AD8EA472AA52A1F196292F1341CD92A68FB2EC0A5BC7DE6C8E83C975420DB4B76CECD4393370FDB2C09F86EC11A50E540F6F02
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Chita) {.. {-9223372036854775808 27232 0 LMT}.. {-1579419232 28800 0 +08}.. {-1247558400 32400 0 +10}.. {354898800 36000 1 +10}.. {370706400 32400 0 +09}.. {386434800 36000 1 +10}.. {402242400 32400 0 +09}.. {417970800 36000 1 +10}.. {433778400 32400 0 +09}.. {449593200 36000 1 +10}.. {465325200 32400 0 +09}.. {481050000 36000 1 +10}.. {496774800 32400 0 +09}.. {512499600 36000 1 +10}.. {528224400 32400 0 +09}.. {543949200 36000 1 +10}.. {559674000 32400 0 +09}.. {575398800 36000 1 +10}.. {591123600 32400 0 +09}.. {606848400 36000 1 +10}.. {622573200 32400 0 +09}.. {638298000 36000 1 +10}.. {654627600 32400 0 +09}.. {670352400 28800 0 +09}.. {670356000 32400 1 +09}.. {686080800 28800 0 +08}.. {695757600 32400 0 +10}.. {701802000 36000 1 +10}.. {717526800 32400 0 +09}.. {733251600 36000 1 +10}.. {748976400 32400 0 +09}.. {7647012
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1619
                                                                                                                                                                                          Entropy (8bit):3.775783980828041
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5th5fSW2sp4Qh2rRSQnGw7GywvWbC25XrMYWG4AIQTUhp9pkTGdXguHaena44XY5:rh5kpmWG29QFUmD
                                                                                                                                                                                          MD5:540A7304A62ABB8D7F84454ABD6E2556
                                                                                                                                                                                          SHA1:52C37529929218A668D7A4AD6FD1B5FE0A727E16
                                                                                                                                                                                          SHA-256:94B2C14EF45C695EF6B19D94722E1BCBB629A595F2866DBA80F00A66721040B5
                                                                                                                                                                                          SHA-512:3B535D109DB369E301D6B412F21EC990976B997826F22B2E16ECEEEB048D60F064C7CA1A616393DC2F1B491BAC0548DC0965B9EA149A95280FFDBCAD6726EF0F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Choibalsan) {.. {-9223372036854775808 27480 0 LMT}.. {-2032933080 25200 0 +07}.. {252435600 28800 0 +08}.. {417974400 36000 0 +09}.. {433778400 32400 0 +09}.. {449593200 36000 1 +09}.. {465314400 32400 0 +09}.. {481042800 36000 1 +09}.. {496764000 32400 0 +09}.. {512492400 36000 1 +09}.. {528213600 32400 0 +09}.. {543942000 36000 1 +09}.. {559663200 32400 0 +09}.. {575391600 36000 1 +09}.. {591112800 32400 0 +09}.. {606841200 36000 1 +09}.. {622562400 32400 0 +09}.. {638290800 36000 1 +09}.. {654616800 32400 0 +09}.. {670345200 36000 1 +09}.. {686066400 32400 0 +09}.. {701794800 36000 1 +09}.. {717516000 32400 0 +09}.. {733244400 36000 1 +09}.. {748965600 32400 0 +09}.. {764694000 36000 1 +09}.. {780415200 32400 0 +09}.. {796143600 36000 1 +09}.. {811864800 32400 0 +09}.. {828198000 36000 1 +09}.. {843919200 32400 0 +09}.. {8596
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):182
                                                                                                                                                                                          Entropy (8bit):4.865222436335267
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8qvfXHAIgNtaYFARL/2WFKh2V7/4WFKdy:SlSWB9vsM3yMPHAIgO8AN/2wKho4wKU
                                                                                                                                                                                          MD5:C5DC40C6325391F7247251ADB2C07F78
                                                                                                                                                                                          SHA1:3DDB1BF94532FB1F1271095B9C8CAA779BC545EF
                                                                                                                                                                                          SHA-256:A87382DC5F3C3141547A65E3746AF1DAF94B51468B96DA6CEF30E95754C97D37
                                                                                                                                                                                          SHA-512:062FF8D5E5392E5372B0405EDF3C7CF997AC33F95EBFFAA9CC9AB82BBE27B60C80255FCCEE9E6F5E02CBFCB163F99984BB2103217FFD1F80BDEC5C684BF2F61A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Shanghai)]} {.. LoadTimeZoneFile Asia/Shanghai..}..set TZData(:Asia/Chongqing) $TZData(:Asia/Shanghai)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):182
                                                                                                                                                                                          Entropy (8bit):4.889115378893491
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8qvfXHAIgNtaYFARL/2WFK7LeL9J4WFKdy:SlSWB9vsM3yMPHAIgO8AN/2wK7LUT4wj
                                                                                                                                                                                          MD5:C3676771EB813B346F58A7B574D0D7B5
                                                                                                                                                                                          SHA1:A473EF621309E019F29F3DEF95C38593775B8404
                                                                                                                                                                                          SHA-256:D6D2B4A761C547F1F853AE901AC71AB49FBE825037079C4E0C89DC940AE4A822
                                                                                                                                                                                          SHA-512:21C3A5D499E6E0427FBF585CA8CC5D99D193C586483AB107C4D8E9F9DC8412021E8E019A314757DAFE1225D2635F6D48E9C54A511709863F22A02449FA201E02
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Shanghai)]} {.. LoadTimeZoneFile Asia/Shanghai..}..set TZData(:Asia/Chungking) $TZData(:Asia/Shanghai)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):369
                                                                                                                                                                                          Entropy (8bit):4.465596050904646
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2wKr+iDm2OHgoHvZv9tdvjSWV/FSQipPUrKkTD/k5QqRVVFSQOR/UIp:MB862zZmdHgCvZvJvj1Nj+Phkv/YtvjA
                                                                                                                                                                                          MD5:9541BB43E79AB0C6E8163945B5BFB1BF
                                                                                                                                                                                          SHA1:C4994420DB8313DECDE19B4B9F6C5DB0126A95A7
                                                                                                                                                                                          SHA-256:E5B5E6D607A15DA65CB00C92C35A63EAF25F547E64CB34BB419CB8CFC2714B1B
                                                                                                                                                                                          SHA-512:46F623B3F7CF8A50F97DD812521398EB9100C9CDFB967C18EF1BD112306AAEB3C9CB224424E48611CB8CC21D1DC3D820DD83032D12BC9DF19301CF07786FA664
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Colombo) {.. {-9223372036854775808 19164 0 LMT}.. {-2840159964 19172 0 MMT}.. {-2019705572 19800 0 +0530}.. {-883287000 21600 1 +06}.. {-862639200 23400 1 +0630}.. {-764051400 19800 0 +0530}.. {832962600 23400 0 +0630}.. {846266400 21600 0 +06}.. {1145039400 19800 0 +0530}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):169
                                                                                                                                                                                          Entropy (8bit):4.786111096226559
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8ntyXHAIgN6KyFvRL/2WFK1S2WFKwBn:SlSWB9vsM3yHtSHAIgMKON/2wKM2wKwB
                                                                                                                                                                                          MD5:BA575D37459540907A644438071277F8
                                                                                                                                                                                          SHA1:14CF10D6AABBAF7BAE42B3B9641D8469C206567F
                                                                                                                                                                                          SHA-256:B3AD560F66EA330E54A147017E6E6AB64452A5255D097B962D540836D7B19EE7
                                                                                                                                                                                          SHA-512:9CA386EF4D812B00C2E63558B81B273F92BBCA98AF304C9FD6FC166210FC4E2F92B769E1D6FB96B670650DC76EFFAD2FC6E39AE12C24B47EAED4E50A2AFAC2D7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Dhaka)]} {.. LoadTimeZoneFile Asia/Dhaka..}..set TZData(:Asia/Dacca) $TZData(:Asia/Dhaka)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8311
                                                                                                                                                                                          Entropy (8bit):3.719987853637512
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:8YI5WpVAdVGlkBOLh8X0CkBheIFlPup7YI6z0Y3lV9Jitv5F6Ya7vEzg93kn/R:8dIpqdk6BrqhXFlPUsz57AbV
                                                                                                                                                                                          MD5:DCB84F498498C06953E7FC1A4FD9AF17
                                                                                                                                                                                          SHA1:5B5A115CDA727C9439667E3E95CA3333E49BA810
                                                                                                                                                                                          SHA-256:7D44F4C16E862752D399999B9F0B1E4E8ED5D80C1322A980094801DD8A4A03EB
                                                                                                                                                                                          SHA-512:DC143B6DB263377413D4BBC9575236D525F6ED898934CB9A2FC1E3B32E1235F2D86BD8E133B38463DFC143EC2F6E8AA9184048479A4E797C39D63A1AD364BB74
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Damascus) {.. {-9223372036854775808 8712 0 LMT}.. {-1577931912 7200 0 EET}.. {-1568592000 10800 1 EEST}.. {-1554080400 7200 0 EET}.. {-1537142400 10800 1 EEST}.. {-1522630800 7200 0 EET}.. {-1505692800 10800 1 EEST}.. {-1491181200 7200 0 EET}.. {-1474243200 10800 1 EEST}.. {-1459126800 7200 0 EET}.. {-242265600 10800 1 EEST}.. {-228877200 7200 0 EET}.. {-210556800 10800 1 EEST}.. {-197427600 7200 0 EET}.. {-178934400 10800 1 EEST}.. {-165718800 7200 0 EET}.. {-147398400 10800 1 EEST}.. {-134269200 7200 0 EET}.. {-116467200 10800 1 EEST}.. {-102646800 7200 0 EET}.. {-84326400 10800 1 EEST}.. {-71110800 7200 0 EET}.. {-52704000 10800 1 EEST}.. {-39488400 7200 0 EET}.. {-21168000 10800 1 EEST}.. {-7952400 7200 0 EET}.. {10368000 10800 1 EEST}.. {23583600 7200 0 EET}.. {41904000 10800 1 EEST}.. {55119600 7200 0 EET}.. {73526400 10800 1
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):364
                                                                                                                                                                                          Entropy (8bit):4.412125512631861
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2wKwiDm2OHEmVFnoHv9vX+Yl7UIFckVVFSQiL/FG/UIvy/Ur9i/Ur97:MB862Y2mdHzdCv9P+Y9vvjeQlP9/9VkK
                                                                                                                                                                                          MD5:B5496A038AC230B9D75AA22BB2BE6BDD
                                                                                                                                                                                          SHA1:ACFD9C78F803F344272E8E188C41ED969EBADA16
                                                                                                                                                                                          SHA-256:BFC4562055CC4355E79F9EFAA580A4C6A658285916159A5D390A0CDA96A97E98
                                                                                                                                                                                          SHA-512:AB05D0176DADC1ED03CC526C372B9827A5FA03459E4F4B4365C6CE4B6FBDA043514A9D3FE2DA747159C5A1BC0E07727E6578A101E42B4DB120AF9624368C5FEA
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Dhaka) {.. {-9223372036854775808 21700 0 LMT}.. {-2524543300 21200 0 HMT}.. {-891582800 23400 0 +0630}.. {-872058600 19800 0 +0530}.. {-862637400 23400 0 +0630}.. {-576138600 21600 0 +06}.. {1230746400 21600 0 +06}.. {1245430800 25200 1 +06}.. {1262278800 21600 0 +06}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):235
                                                                                                                                                                                          Entropy (8bit):4.597480383845617
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2wKCXeSDm2OHnBGeoH1mpvyvScHTU71avScr:MB862qXbmdHnBvC1SyHHq8Hr
                                                                                                                                                                                          MD5:316DDF860FA234621698EB473E558DB7
                                                                                                                                                                                          SHA1:35BF955F764555945CF8B314B8E881DAD6CF557B
                                                                                                                                                                                          SHA-256:8BC2E0D77AC35B6D63E11B820AC45EC23A4195ED773680C600C772FDF4B953F8
                                                                                                                                                                                          SHA-512:D1A8D5F1DAAB7827BDCBC14506AF8681FD1ED94C6101CC4A3C8CC2A76EA7D3649038069158C539A2007A1B0734FBD87DE120415E07A3F08F44417100C95459F5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Dili) {.. {-9223372036854775808 30140 0 LMT}.. {-1830414140 28800 0 +08}.. {-879152400 32400 0 +09}.. {199897200 28800 0 +08}.. {969120000 32400 0 +09}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):148
                                                                                                                                                                                          Entropy (8bit):4.97292023820863
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/2WFKQUMXGm2OHvkdoHsQK23NVsRYovV:SlSWB9eg/2wKQUDm2OHvsoHxVNSN
                                                                                                                                                                                          MD5:861BA4A0A71E6C3F71B90074275FD57C
                                                                                                                                                                                          SHA1:BC6FC5233340BB19AE4BD0BA563875479AC0A2B9
                                                                                                                                                                                          SHA-256:3DB174F1568BC23BF467A3DC7BAF8A2A2952B70653D4DE54F4DB391EC50B6925
                                                                                                                                                                                          SHA-512:B187735E0783F299253D9F93E002AEFF131FCCA50FB3E04CF0545B334B051D5ED978108A47C6957B608F5F93ED4CC3D69751FE0F40413719EE1C0440CD49AC76
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Dubai) {.. {-9223372036854775808 13272 0 LMT}.. {-1577936472 14400 0 +04}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):820
                                                                                                                                                                                          Entropy (8bit):3.969189280047274
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5we3dJvOt81FCuLqecDngO6jPvTpYy5T4TiFGDr:5BvdJqxiF0uGr
                                                                                                                                                                                          MD5:9ABD0ECB5F3E738F49CDD1F81C9FF1A4
                                                                                                                                                                                          SHA1:46B68C7BBD1BE9791B00128A5129AA3668435C93
                                                                                                                                                                                          SHA-256:550DB44595F59D0F151BE4AF70D6FECE20580AB687EF45DE2A0A75FB2515AC80
                                                                                                                                                                                          SHA-512:67E2B0EF216D509C4B6DD367519E0A733E54A7CA767D5F7960715E8056E61B7B633C7516D568544F55C9277E90412C1443B822C6EED3341C01F1BD9AA9476FA1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Dushanbe) {.. {-9223372036854775808 16512 0 LMT}.. {-1441168512 18000 0 +05}.. {-1247547600 21600 0 +06}.. {354909600 25200 1 +06}.. {370717200 21600 0 +06}.. {386445600 25200 1 +06}.. {402253200 21600 0 +06}.. {417981600 25200 1 +06}.. {433789200 21600 0 +06}.. {449604000 25200 1 +06}.. {465336000 21600 0 +06}.. {481060800 25200 1 +06}.. {496785600 21600 0 +06}.. {512510400 25200 1 +06}.. {528235200 21600 0 +06}.. {543960000 25200 1 +06}.. {559684800 21600 0 +06}.. {575409600 25200 1 +06}.. {591134400 21600 0 +06}.. {606859200 25200 1 +06}.. {622584000 21600 0 +06}.. {638308800 25200 1 +06}.. {654638400 21600 0 +06}.. {670363200 21600 1 +06}.. {684363600 18000 0 +05}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7597
                                                                                                                                                                                          Entropy (8bit):3.7170041442081203
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:G3pv/7V6Aj8aZaNlK0UpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBKb0l:G3v/AaaivBeRF+W35Syrwl9h5j
                                                                                                                                                                                          MD5:F8E4BA3E260452AE13CF234E60149A62
                                                                                                                                                                                          SHA1:8DDB08E2FDEEF6539EE0C0038B166908BFED16CD
                                                                                                                                                                                          SHA-256:8CFE85C48FC22033411432F8B75EE4C097A5D84897698CB1AFD5AB51C47FF5A3
                                                                                                                                                                                          SHA-512:487177411FB7E9F83AB9AAD84B685322B13A85784D4F90BB9C30F57BFAA6A9298E5C4F36C97444DE1117E51F85A62DC639D08B405460D071C2B29C898553E9A3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Famagusta) {.. {-9223372036854775808 8148 0 LMT}.. {-1518920148 7200 0 EET}.. {166572000 10800 1 EEST}.. {182293200 7200 0 EET}.. {200959200 10800 1 EEST}.. {213829200 7200 0 EET}.. {228866400 10800 1 EEST}.. {243982800 7200 0 EET}.. {260316000 10800 1 EEST}.. {276123600 7200 0 EET}.. {291765600 10800 1 EEST}.. {307486800 7200 0 EET}.. {323820000 10800 1 EEST}.. {338936400 7200 0 EET}.. {354664800 10800 1 EEST}.. {370386000 7200 0 EET}.. {386114400 10800 1 EEST}.. {401835600 7200 0 EET}.. {417564000 10800 1 EEST}.. {433285200 7200 0 EET}.. {449013600 10800 1 EEST}.. {465339600 7200 0 EET}.. {481068000 10800 1 EEST}.. {496789200 7200 0 EET}.. {512517600 10800 1 EEST}.. {528238800 7200 0 EET}.. {543967200 10800 1 EEST}.. {559688400 7200 0 EET}.. {575416800 10800 1 EEST}.. {591138000 7200 0 EET}.. {606866400 10800 1 EEST}.. {622587
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8427
                                                                                                                                                                                          Entropy (8bit):3.7517631589916043
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:NyHSd2XK1GbJFp3gP0nPVl8dcqU/8O8pc1FlvaiSjxHe5PTisXNlDN3uMeVunBjq:NyyIgGbJv3dPAD7c1Flvai+4j/NKJ
                                                                                                                                                                                          MD5:E539AE663A076DD9F1C6E927289DE5B1
                                                                                                                                                                                          SHA1:855BCE0790A7259B01181861BCC748FE5F2815EB
                                                                                                                                                                                          SHA-256:F030E2B3DBCA556C36602FBF234C7DB7D4F222D02CFAB192288E91E6A1BF3C90
                                                                                                                                                                                          SHA-512:83E87396576A36455DF22EE809D71CBD18CDEC7F574A7AABFF6D5A21A71D2BE865B84105E2D72FD89F3C9AB19B66B6893F82934925E2311A8E6EAA015D6227F9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Gaza) {.. {-9223372036854775808 8272 0 LMT}.. {-2185409872 7200 0 EEST}.. {-933638400 10800 1 EEST}.. {-923097600 7200 0 EEST}.. {-919036800 10800 1 EEST}.. {-857347200 7200 0 EEST}.. {-844300800 10800 1 EEST}.. {-825811200 7200 0 EEST}.. {-812678400 10800 1 EEST}.. {-794188800 7200 0 EEST}.. {-779846400 10800 1 EEST}.. {-762652800 7200 0 EEST}.. {-748310400 10800 1 EEST}.. {-731116800 7200 0 EEST}.. {-682653600 7200 0 EET}.. {-399088800 10800 1 EEST}.. {-386650800 7200 0 EET}.. {-368330400 10800 1 EEST}.. {-355114800 7200 0 EET}.. {-336790800 10800 1 EEST}.. {-323654400 7200 0 EET}.. {-305168400 10800 1 EEST}.. {-292032000 7200 0 EET}.. {-273632400 10800 1 EEST}.. {-260496000 7200 0 EET}.. {-242096400 10800 1 EEST}.. {-228960000 7200 0 EET}.. {-210560400 10800 1 EEST}.. {-197424000 7200 0 EET}.. {-178938000 10800 1 EEST}.. {-16580
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):179
                                                                                                                                                                                          Entropy (8bit):4.86422571961583
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8qvfXHAIgNtaYFARL/2WFKwHp4WFKdy:SlSWB9vsM3yMPHAIgO8AN/2wKi4wKU
                                                                                                                                                                                          MD5:1BCCB3578FADE993EE8B2C11EAC06CD8
                                                                                                                                                                                          SHA1:CAEAB714E014CD5040C44E4603708B97BC0B03D4
                                                                                                                                                                                          SHA-256:12811A7944B892E3D1C0B4B09057CC1899F28081B3CD47FFD248BA49BA308AF0
                                                                                                                                                                                          SHA-512:1D791DC0E8F45359366DF33C2C337688D2E0E972A90F038733B840D28585505AEF542DDBAD014C9EA8C252048A588CD017DD67A84545A81EDB7C17E3B2E65092
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Shanghai)]} {.. LoadTimeZoneFile Asia/Shanghai..}..set TZData(:Asia/Harbin) $TZData(:Asia/Shanghai)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8402
                                                                                                                                                                                          Entropy (8bit):3.754379249421927
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:fXSd2XK1GbJFp3gP0nPVl8dcqUZ8O8pc1FlvaiSjxHe5PTisXNlDN3uMeVunBj5w:fiIgGbJv3dPADPc1Flvai+4j/NKJ
                                                                                                                                                                                          MD5:02B58C89D64C423A47559B2386FDAD1F
                                                                                                                                                                                          SHA1:B01C4C83ACB44F454A593A510BCBB5A4068EC835
                                                                                                                                                                                          SHA-256:2C126BA5F78CF7A13FBDFE00F647BB29E2AC104B89AB51B39281047D9B2E45A7
                                                                                                                                                                                          SHA-512:BBF564FBBDF90091F4D97F3DCFA0F2AF1CE6EB6B0D24CE4F4133E098F7A637344A78BB27DD8160D8424148ECB46B7BF578959B15F9AA0AEAD5D080DCE7C9C176
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Hebron) {.. {-9223372036854775808 8423 0 LMT}.. {-2185410023 7200 0 EEST}.. {-933638400 10800 1 EEST}.. {-923097600 7200 0 EEST}.. {-919036800 10800 1 EEST}.. {-857347200 7200 0 EEST}.. {-844300800 10800 1 EEST}.. {-825811200 7200 0 EEST}.. {-812678400 10800 1 EEST}.. {-794188800 7200 0 EEST}.. {-779846400 10800 1 EEST}.. {-762652800 7200 0 EEST}.. {-748310400 10800 1 EEST}.. {-731116800 7200 0 EEST}.. {-682653600 7200 0 EET}.. {-399088800 10800 1 EEST}.. {-386650800 7200 0 EET}.. {-368330400 10800 1 EEST}.. {-355114800 7200 0 EET}.. {-336790800 10800 1 EEST}.. {-323654400 7200 0 EET}.. {-305168400 10800 1 EEST}.. {-292032000 7200 0 EET}.. {-273632400 10800 1 EEST}.. {-260496000 7200 0 EET}.. {-242096400 10800 1 EEST}.. {-228960000 7200 0 EET}.. {-210560400 10800 1 EEST}.. {-197424000 7200 0 EET}.. {-178938000 10800 1 EEST}.. {-165
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):395
                                                                                                                                                                                          Entropy (8bit):4.419283016412891
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB862RLmdHqCv3tYC5sF/p+zHHviViksF/dMUYPsF/RQ9EsV:5debv3td5sFR+znv2vsFlM/PsFVsV
                                                                                                                                                                                          MD5:5154581E724080F43C9D68B983C5CF77
                                                                                                                                                                                          SHA1:1BC86A418AA654DA9EF73954DFD01ACF53D796E9
                                                                                                                                                                                          SHA-256:FE977368691F4FA43D068CD8D989F39D2AEC46D199D7D629B8DD3ECF7423A335
                                                                                                                                                                                          SHA-512:3708654E022919D5CDC2CA90D8623370CFFF248E3AF10ECCBB6F56BC7E8DD000E6119614C30678D6628BBE6A8CCA00746315108A04632B3F6DD2DE172BBF8956
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Ho_Chi_Minh) {.. {-9223372036854775808 25600 0 LMT}.. {-2004073600 25590 0 PLMT}.. {-1851577590 25200 0 +07}.. {-852105600 28800 0 +08}.. {-782643600 32400 0 +09}.. {-767869200 25200 0 +07}.. {-718095600 28800 0 +08}.. {-457776000 25200 0 +07}.. {-315648000 28800 0 +08}.. {171820800 25200 0 +07}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2226
                                                                                                                                                                                          Entropy (8bit):4.0055033036300145
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5Ze9l9Pm4yoHtTYJJIX1Zcp6GS0j1SPQpP6gPE8fTZIPNYQGm75st/nQdwi9:DyaoTcwQt6EsQTng
                                                                                                                                                                                          MD5:26BCBBA28AE34FE3CF7D17EF4C6B69C8
                                                                                                                                                                                          SHA1:5324DEA8E7965C66650E7B4769EFA1297B508486
                                                                                                                                                                                          SHA-256:EE9A6997BC1AAD4A8FA95DB312774C3F37FBB895549230C30FC66C02CC170EB6
                                                                                                                                                                                          SHA-512:54594CD18838B4A8947EBB5BDE2415727CC127CF79AEC98FC0F5D5A32F68EEAF4E079853239DE9F753CE90F18EFD55AE51FC43D64E313666CEA0EF8AC93BF065
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Hong_Kong) {.. {-9223372036854775808 27402 0 LMT}.. {-2056690800 28800 0 HKT}.. {-900910800 32400 1 HKST}.. {-891579600 30600 1 HKWT}.. {-884248200 32400 0 JST}.. {-761209200 28800 0 HKT}.. {-747907200 32400 1 HKST}.. {-728541000 28800 0 HKT}.. {-717049800 32400 1 HKST}.. {-697091400 28800 0 HKT}.. {-683785800 32400 1 HKST}.. {-668061000 28800 0 HKT}.. {-654755400 32400 1 HKST}.. {-636611400 28800 0 HKT}.. {-623305800 32400 1 HKST}.. {-605161800 28800 0 HKT}.. {-591856200 32400 1 HKST}.. {-573712200 28800 0 HKT}.. {-559801800 32400 1 HKST}.. {-541657800 28800 0 HKT}.. {-528352200 32400 1 HKST}.. {-510211800 28800 0 HKT}.. {-498112200 32400 1 HKST}.. {-478762200 28800 0 HKT}.. {-466662600 32400 1 HKST}.. {-446707800 28800 0 HKT}.. {-435213000 32400 1 HKST}.. {-415258200 28800 0 HKT}.. {-403158600 32400 1 HKST}.. {-383808600 28800 0 HKT
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1583
                                                                                                                                                                                          Entropy (8bit):3.7521760184466206
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5x3LecCvgsFFFKOksF8FpsF71FQnsFNFxhsFlF6sFaFasFZFisF8GF5sFKLFAZsZ:5FqKVx8Cq9f/y2L
                                                                                                                                                                                          MD5:A77140A0D8C2D3E2993E4BA7CADFB4C6
                                                                                                                                                                                          SHA1:AE3586264A86D42F578D4B0F7A30C9BE6047EAB1
                                                                                                                                                                                          SHA-256:CA88A45E954A9854C680B399E69E4858BF5E861FABFADC19D62D97B734B25415
                                                                                                                                                                                          SHA-512:05EA9D903EEC755F799B7C2399ED933245A5AE3A594648FE37AF1CE7699AE499B4ED159F428D91259D80BC9AF5117F2DA055A506AED94E5281C38B7AFF69C6FE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Hovd) {.. {-9223372036854775808 21996 0 LMT}.. {-2032927596 21600 0 +06}.. {252439200 25200 0 +07}.. {417978000 28800 1 +07}.. {433785600 25200 0 +07}.. {449600400 28800 1 +07}.. {465321600 25200 0 +07}.. {481050000 28800 1 +07}.. {496771200 25200 0 +07}.. {512499600 28800 1 +07}.. {528220800 25200 0 +07}.. {543949200 28800 1 +07}.. {559670400 25200 0 +07}.. {575398800 28800 1 +07}.. {591120000 25200 0 +07}.. {606848400 28800 1 +07}.. {622569600 25200 0 +07}.. {638298000 28800 1 +07}.. {654624000 25200 0 +07}.. {670352400 28800 1 +07}.. {686073600 25200 0 +07}.. {701802000 28800 1 +07}.. {717523200 25200 0 +07}.. {733251600 28800 1 +07}.. {748972800 25200 0 +07}.. {764701200 28800 1 +07}.. {780422400 25200 0 +07}.. {796150800 28800 1 +07}.. {811872000 25200 0 +07}.. {828205200 28800 1 +07}.. {843926400 25200 0 +07}.. {859654800
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2089
                                                                                                                                                                                          Entropy (8bit):3.7296034934492694
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5PZy4DdOKStci4KjXoYjoSvfQJWE00dtT43kgiTskNrrBizhzRBqY3M:Py2/svfraBGfgP
                                                                                                                                                                                          MD5:C9F7AC464970567E5C38CB01ED2297AE
                                                                                                                                                                                          SHA1:453718BACCAE3FACD761AF22CA5875185478ADDD
                                                                                                                                                                                          SHA-256:61BAAAD6315FFBDAED6F266880165B06ECCAF72F660B7FB01C8B654F3952D68E
                                                                                                                                                                                          SHA-512:72044EFAE262CC12974F2DE2AAF06AC4C31BE73071ACD53DDC6B8D8BFC6FBDF937EC03DC881901F730659BDE662FBCFC76C57B2C086DAA97F160530464FBA7C6
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Irkutsk) {.. {-9223372036854775808 25025 0 LMT}.. {-2840165825 25025 0 IMT}.. {-1575874625 25200 0 +07}.. {-1247554800 28800 0 +09}.. {354902400 32400 1 +09}.. {370710000 28800 0 +08}.. {386438400 32400 1 +09}.. {402246000 28800 0 +08}.. {417974400 32400 1 +09}.. {433782000 28800 0 +08}.. {449596800 32400 1 +09}.. {465328800 28800 0 +08}.. {481053600 32400 1 +09}.. {496778400 28800 0 +08}.. {512503200 32400 1 +09}.. {528228000 28800 0 +08}.. {543952800 32400 1 +09}.. {559677600 28800 0 +08}.. {575402400 32400 1 +09}.. {591127200 28800 0 +08}.. {606852000 32400 1 +09}.. {622576800 28800 0 +08}.. {638301600 32400 1 +09}.. {654631200 28800 0 +08}.. {670356000 25200 0 +08}.. {670359600 28800 1 +08}.. {686084400 25200 0 +07}.. {695761200 28800 0 +09}.. {701805600 32400 1 +09}.. {717530400 28800 0 +08}.. {733255200 32400 1 +09}.. {748
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):187
                                                                                                                                                                                          Entropy (8bit):4.9013773460609
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV0XaDovXHAIgoq3XRFvHRL/2WFK4HB/8QaqXKv:SlSWB9vsM3ymQa2HAIgoQ/HN/2wK4HJa
                                                                                                                                                                                          MD5:8A92C690BE27A69D122BFF51479B7B56
                                                                                                                                                                                          SHA1:52DB64587A347F34153A51788BDE8C349D966575
                                                                                                                                                                                          SHA-256:1F77C4BD27574E1D2066885DEF01806A02D3E444424A219A8EC5C114F89665E5
                                                                                                                                                                                          SHA-512:FEDF57C4862B6792A789F339EB1027EC8A8472B01B7D1D0814C419850B9AC03A7B454FDB04D8BECE166E9A8BCAA58B0B461007A6C824B30B1080991A1DB49CCA
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Istanbul)]} {.. LoadTimeZoneFile Europe/Istanbul..}..set TZData(:Asia/Istanbul) $TZData(:Europe/Istanbul)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):370
                                                                                                                                                                                          Entropy (8bit):4.4733192761103515
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2wKcrJfDm2OHATJeoHMaSYov/YSZkc5q/MVSSFFWSyvScH+dMVSSFL+:MB862EJLmdHjCEdOc5aMxaSyHHaMxF6P
                                                                                                                                                                                          MD5:C689A1AA9FFE535AEB3AD3D7EDE55172
                                                                                                                                                                                          SHA1:0520FC9A4619FB555A79C5DF2AE82422BF2C5EDA
                                                                                                                                                                                          SHA-256:2F39D9F93761B85C254F458317A7DE2B4184BE9459F2193A85C08662E801269A
                                                                                                                                                                                          SHA-512:C1034FB2FCFEF201C5362AF21B048B6637A824C5C93D75854CF3807892C772CD4376533E58BFF8D8726F531F43CB231365B8012EBD3C1BECED865D3CD2D6673D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Jakarta) {.. {-9223372036854775808 25632 0 LMT}.. {-3231299232 25632 0 BMT}.. {-1451719200 26400 0 +0720}.. {-1172906400 27000 0 +0730}.. {-876641400 32400 0 +09}.. {-766054800 27000 0 +0730}.. {-683883000 28800 0 +08}.. {-620812800 27000 0 +0730}.. {-189415800 25200 0 WIB}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):213
                                                                                                                                                                                          Entropy (8bit):4.834345288972067
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2wKcaDm2OHG4YoH1kcfvScHVowkVcr2CV4zvhyov:MB862PmdHNYC6cfHHVop2NVkoov
                                                                                                                                                                                          MD5:2CB3A13FCC48F8C4457E001FC309918B
                                                                                                                                                                                          SHA1:83174176815CB93D216B5BC532C120EC8AC433CF
                                                                                                                                                                                          SHA-256:761C1E80FEBF46D6D6215CEBF211F121974156D9BCE2FB4258C1074C6ED2CE22
                                                                                                                                                                                          SHA-512:65009020AB9FEC2F8158A4851A78B71127F9B262DDD1472583942E19B7C086304F54BC8DAE5A40BD1448BCAEDA0FDBACCD19400E10FFA0357E324535F9036EF0
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Jayapura) {.. {-9223372036854775808 33768 0 LMT}.. {-1172913768 32400 0 +09}.. {-799491600 34200 0 +0930}.. {-189423000 32400 0 WIT}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8135
                                                                                                                                                                                          Entropy (8bit):3.770028446231146
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:GKfnxFAEX/nPVl8diAg9oEhH20AHz7LzdWhYbBJPXuVhKaM76Rmg4DLeEcNptv5C:7ffBvPAzF0AHzPzdD1+XBRF0
                                                                                                                                                                                          MD5:884227D48C92BA6C519BFE571D4F1037
                                                                                                                                                                                          SHA1:21F8977816C2B439686A50D353B836A6D132A946
                                                                                                                                                                                          SHA-256:0BDC2C693134199C2ECD374CC01468813DB29DF47422C706A3EA2BE5ECCA177A
                                                                                                                                                                                          SHA-512:8A09F1FE11DAD203501A16FE6A2CAEC969FE3553B456B8BD1997E55B3EE430B2BB4B54F7D87C5E99931FD96E7C769CAA618C777EBD23FBD1E1A0F57409422914
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Jerusalem) {.. {-9223372036854775808 8454 0 LMT}.. {-2840149254 8440 0 JMT}.. {-1641003640 7200 0 IST}.. {-933638400 10800 1 IDT}.. {-923097600 7200 0 IST}.. {-919036800 10800 1 IDT}.. {-857347200 7200 0 IST}.. {-844300800 10800 1 IDT}.. {-825811200 7200 0 IST}.. {-812678400 10800 1 IDT}.. {-794188800 7200 0 IST}.. {-779846400 10800 1 IDT}.. {-762652800 7200 0 IST}.. {-748310400 10800 1 IDT}.. {-731116800 7200 0 IST}.. {-681955200 14400 1 IDDT}.. {-673228800 10800 1 IDT}.. {-667958400 7200 0 IST}.. {-652320000 10800 1 IDT}.. {-636422400 7200 0 IST}.. {-622080000 10800 1 IDT}.. {-608947200 7200 0 IST}.. {-591840000 10800 1 IDT}.. {-572486400 7200 0 IST}.. {-558576000 10800 1 IDT}.. {-542851200 7200 0 IST}.. {-527731200 10800 1 IDT}.. {-514425600 7200 0 IST}.. {-490838400 10800 1 IDT}.. {-482976000 7200 0 IST}.. {-459388800 10800 1 I
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):180
                                                                                                                                                                                          Entropy (8bit):4.8546989169864085
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/2WFKTtNMXGm2OHodFxsYoHvgVHURRNVsRYovFFFkdj/cXHF:SlSWB9eg/2wKTPDm2OHoH+YoHvgVHURA
                                                                                                                                                                                          MD5:9BD9B21661C235C0794078EC98978D3B
                                                                                                                                                                                          SHA1:3D854780F49D0E5F5A190DC9367C7406127C5E4D
                                                                                                                                                                                          SHA-256:A59C95C038F2E945D685D96FA9B859CE82A643A1B7F56EB36B2C809DE91CD4BA
                                                                                                                                                                                          SHA-512:A76E99CF03DA8897F0A210A98DB79E4CD60070F2BE363D0D0960D9882919F9B49978FA55BB2500F1648ADD4080730CAD85BAFF61D885A9EAD394AC04C850F6BA
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Kabul) {.. {-9223372036854775808 16608 0 LMT}.. {-2524538208 14400 0 +04}.. {-788932800 16200 0 +0430}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2060
                                                                                                                                                                                          Entropy (8bit):3.788131608921229
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5+SeWI/2kkWk7YFpR2kHmxCcUdBbcHDLV2vpXt25A0UeRr9ydzkMfF6USRWk9UuV:5i/2ZsFLrcZwvJt2F+doTr9Q3G80
                                                                                                                                                                                          MD5:390F39934F095F89358B73D056D90264
                                                                                                                                                                                          SHA1:6B57CE5346B50ED88BFBB6BC57F834FB3F564905
                                                                                                                                                                                          SHA-256:6E0278E389072437BC07A5032CD58E9E5B1B2BDB20918632C422EFA97BC43ABF
                                                                                                                                                                                          SHA-512:6C54D94E95D73030F2FFCF8D130494CBD79FB1CEB9B59ADE0743C10F02557C3DD59CC6274B262A7E29C2D4C35DDA4B6A9A0398C661F5BD40F3B92181192B9577
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Kamchatka) {.. {-9223372036854775808 38076 0 LMT}.. {-1487759676 39600 0 +11}.. {-1247569200 43200 0 +13}.. {354888000 46800 1 +13}.. {370695600 43200 0 +12}.. {386424000 46800 1 +13}.. {402231600 43200 0 +12}.. {417960000 46800 1 +13}.. {433767600 43200 0 +12}.. {449582400 46800 1 +13}.. {465314400 43200 0 +12}.. {481039200 46800 1 +13}.. {496764000 43200 0 +12}.. {512488800 46800 1 +13}.. {528213600 43200 0 +12}.. {543938400 46800 1 +13}.. {559663200 43200 0 +12}.. {575388000 46800 1 +13}.. {591112800 43200 0 +12}.. {606837600 46800 1 +13}.. {622562400 43200 0 +12}.. {638287200 46800 1 +13}.. {654616800 43200 0 +12}.. {670341600 39600 0 +12}.. {670345200 43200 1 +12}.. {686070000 39600 0 +11}.. {695746800 43200 0 +13}.. {701791200 46800 1 +13}.. {717516000 43200 0 +12}.. {733240800 46800 1 +13}.. {748965600 43200 0 +12}.. {764
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):457
                                                                                                                                                                                          Entropy (8bit):4.396286144160272
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB862dmdH35Cy6DvjeQXvjKEn6vNEhFc0bkTfb2iWToN1:5de3IjjeQ/jKE6vNNa8
                                                                                                                                                                                          MD5:DF604BCD42A3C1E6BABD0E4FF5764CA3
                                                                                                                                                                                          SHA1:984111F3A75EE7D8760AA2B839010545AF8EE359
                                                                                                                                                                                          SHA-256:4E7F7ACAE8B4018A835328744F680C8054771805BB0BB07678A09737963C090D
                                                                                                                                                                                          SHA-512:690AC3FC7CA3C66AA70F17E38C6B43FFACAB3F86040C3BA94FBFF80AC8C1AECF8192E503282109DABF3228F8DC73C732F1041C80455B8B26BDB25C4C32FA286A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Karachi) {.. {-9223372036854775808 16092 0 LMT}.. {-1988166492 19800 0 +0530}.. {-862637400 23400 1 +0630}.. {-764145000 19800 0 +0530}.. {-576135000 18000 0 +05}.. {38775600 18000 0 PKT}.. {1018119600 21600 1 PKST}.. {1033840800 18000 0 PKT}.. {1212260400 21600 1 PKST}.. {1225476000 18000 0 PKT}.. {1239735600 21600 1 PKST}.. {1257012000 18000 0 PKT}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):174
                                                                                                                                                                                          Entropy (8bit):4.967143524972358
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8s4YkyXHAIgNrYOARL/2WFKu3e2WFKjov:SlSWB9vsM3yMGSHAIgvAN/2wKulwKjy
                                                                                                                                                                                          MD5:259662F35AA09A891C2DDF8FCFECD6F0
                                                                                                                                                                                          SHA1:DBB3A363A34C33F0B6B0D677E43C2985E2BAF976
                                                                                                                                                                                          SHA-256:7B2251F0A41CBADF45D69F24604834167B14D8D33B510E635719AB404CABBCE2
                                                                                                                                                                                          SHA-512:CD7E514555D58985C774535556B66542EFC5FB7CD5891F42FE21B591612CB7EBD4B41E96593E26E9283BA1B01EF3BE0FDFAE871F5EF6ADF2286AF1E479DCB44B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Urumqi)]} {.. LoadTimeZoneFile Asia/Urumqi..}..set TZData(:Asia/Kashgar) $TZData(:Asia/Urumqi)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):185
                                                                                                                                                                                          Entropy (8bit):4.896398105471451
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/2WFKXIi7hvXMXGm2OHF+VT5oHsQKwMTXvv6Q6zRk8P4VvW/:SlSWB9eg/2wKYghfDm2OH0T5oHxNMzv8
                                                                                                                                                                                          MD5:7AC6429D2A08372C71C61B4521246FEC
                                                                                                                                                                                          SHA1:6E50F5AD1018398491453D751F8B717B618EF46E
                                                                                                                                                                                          SHA-256:F0A0816E62036637F75081CBF17A1E6B8FBC2D86AEC3CD2E234BBBDD6EC9F109
                                                                                                                                                                                          SHA-512:A5389A318896ABCAFE419262F6B8CA86C917788F1E2AFBC8CB1C074A52870E7A92C9F6F7D79DDE4AB0D267D870D3CCD69B3FC5FD57520352EFE36C583B493FB9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Kathmandu) {.. {-9223372036854775808 20476 0 LMT}.. {-1577943676 19800 0 +0530}.. {504901800 20700 0 +0545}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):184
                                                                                                                                                                                          Entropy (8bit):4.8363583658476745
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8yIi7V5XHAIgN1AIilvWARL/2WFKSiZ1/2WFKXIi7y:SlSWB9vsM3y7gVJHAIg5QOAN/2wKSg15
                                                                                                                                                                                          MD5:4CCC96293A33113D9ADC4130DCD19CBA
                                                                                                                                                                                          SHA1:7BAB4B8DD6BB415A2FC86D9AB36BE2A893C03153
                                                                                                                                                                                          SHA-256:9ACC9586B6F8B53BFE8B242283A434A9A9633D60559EBFDEE263B4C8915D50CA
                                                                                                                                                                                          SHA-512:644E1777E01C15A728E30526F131462FCE50476A8FEDA9B99F41D95013BB8833A79437E75AA2025E2FD2E253B9AD40709DEF77E1F0C73DAAE7A9CF886A175A03
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Kathmandu)]} {.. LoadTimeZoneFile Asia/Kathmandu..}..set TZData(:Asia/Katmandu) $TZData(:Asia/Kathmandu)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2119
                                                                                                                                                                                          Entropy (8bit):3.707911838150672
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5No6r1gIgWH/lt0irzEzCSCItWiIrW+rDQk9CVhyFYkRDhUBAc6l:r5PhtjLiII2JBC6c6l
                                                                                                                                                                                          MD5:D7B394A9662D60D01781005FE73CC9E8
                                                                                                                                                                                          SHA1:50B5EBD02596DC45D1F69358C5B69DD3058905FC
                                                                                                                                                                                          SHA-256:33203D7FB7F3D1F848640ECE0642A2305E1863B4D47413075E2E7E40BD7418E7
                                                                                                                                                                                          SHA-512:055EBA420F2F6049E803796ACCA263264B9E585E5312A86B8DF7B409C5F1CB1810F3AEDACD66CCF4605E55198947D263C240486C2A4D453D23C89802F0C66BBA
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Khandyga) {.. {-9223372036854775808 32533 0 LMT}.. {-1579424533 28800 0 +08}.. {-1247558400 32400 0 +10}.. {354898800 36000 1 +10}.. {370706400 32400 0 +09}.. {386434800 36000 1 +10}.. {402242400 32400 0 +09}.. {417970800 36000 1 +10}.. {433778400 32400 0 +09}.. {449593200 36000 1 +10}.. {465325200 32400 0 +09}.. {481050000 36000 1 +10}.. {496774800 32400 0 +09}.. {512499600 36000 1 +10}.. {528224400 32400 0 +09}.. {543949200 36000 1 +10}.. {559674000 32400 0 +09}.. {575398800 36000 1 +10}.. {591123600 32400 0 +09}.. {606848400 36000 1 +10}.. {622573200 32400 0 +09}.. {638298000 36000 1 +10}.. {654627600 32400 0 +09}.. {670352400 28800 0 +09}.. {670356000 32400 1 +09}.. {686080800 28800 0 +08}.. {695757600 32400 0 +10}.. {701802000 36000 1 +10}.. {717526800 32400 0 +09}.. {733251600 36000 1 +10}.. {748976400 32400 0 +09}.. {7647
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):336
                                                                                                                                                                                          Entropy (8bit):4.614218930153471
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2wKvhfDm2OHEX3gYoHrXdUvvYbQLpUFdvjSVVFJLNsR/QFckVVFJLLW:MB8623tmdHNYCDWXYbQtUTvjAJBs50vs
                                                                                                                                                                                          MD5:248F1B5A26455000C936CE8BC02C1A0B
                                                                                                                                                                                          SHA1:0C3F8CD4E038B113E5238AC52652809B6CA27999
                                                                                                                                                                                          SHA-256:6D464564ED2EFC9DADA1586D4FC99FE333726D2BE15A00E30C2391F588896463
                                                                                                                                                                                          SHA-512:AF36B0B3D410305ED504726C87265ACCAF5577A9B5DD7E7DAF135420E356C651287873197431B65B5317B4BA2009274288E4F101AC1274045A8D99E2414AB132
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Kolkata) {.. {-9223372036854775808 21208 0 LMT}.. {-3645237208 21200 0 HMT}.. {-3155694800 19270 0 MMT}.. {-2019705670 19800 0 IST}.. {-891581400 23400 1 +0630}.. {-872058600 19800 0 IST}.. {-862637400 23400 1 +0630}.. {-764145000 19800 0 IST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2062
                                                                                                                                                                                          Entropy (8bit):3.7086418466382605
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5Ote2CoXJfsFN/3sFrOksF/sF7IyksF7FRZsFLsFTsFcsFk73sFK/XCFKTipnFEw:5B40yVRB7VfXucydm46I/CTxwh
                                                                                                                                                                                          MD5:A59F7FFD0C3EBAD47EC5F2B89EBBD9FA
                                                                                                                                                                                          SHA1:ACB94E28E0CF7C6606086267CEA1F63A3E755F56
                                                                                                                                                                                          SHA-256:53B8D5E7FB1BD67FECE66A933D9BDBB773F14A8C04D316A2A1B00EC6DBC151DD
                                                                                                                                                                                          SHA-512:7B3886B9D0A793CCEEDB2B190523922CFEBE5C82A5201C9EFA30CA4C7F63FB75C998CC7E1BD48D5D489F16E36FC0C22BD954CB7D321B3C09B36B60629C4C9F7E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Krasnoyarsk) {.. {-9223372036854775808 22286 0 LMT}.. {-1577513486 21600 0 +06}.. {-1247551200 25200 0 +08}.. {354906000 28800 1 +08}.. {370713600 25200 0 +07}.. {386442000 28800 1 +08}.. {402249600 25200 0 +07}.. {417978000 28800 1 +08}.. {433785600 25200 0 +07}.. {449600400 28800 1 +08}.. {465332400 25200 0 +07}.. {481057200 28800 1 +08}.. {496782000 25200 0 +07}.. {512506800 28800 1 +08}.. {528231600 25200 0 +07}.. {543956400 28800 1 +08}.. {559681200 25200 0 +07}.. {575406000 28800 1 +08}.. {591130800 25200 0 +07}.. {606855600 28800 1 +08}.. {622580400 25200 0 +07}.. {638305200 28800 1 +08}.. {654634800 25200 0 +07}.. {670359600 21600 0 +07}.. {670363200 25200 1 +07}.. {686088000 21600 0 +06}.. {695764800 25200 0 +08}.. {701809200 28800 1 +08}.. {717534000 25200 0 +07}.. {733258800 28800 1 +08}.. {748983600 25200 0 +07}.. {7
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):375
                                                                                                                                                                                          Entropy (8bit):4.4690470842439005
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2wK1NSDm2OHroHvmdXjvWOb/MVSYyF/3MesF5XJSx0dMVSSFF8kvScy:MB862PGmdHrCvovDTMsF/CFDMx/HHbMj
                                                                                                                                                                                          MD5:5CFF42C943FFC92D16DACEB2872590A8
                                                                                                                                                                                          SHA1:AEA8B1583764BE2AF7B055BC6AFAA0E486A2E35F
                                                                                                                                                                                          SHA-256:25A8328B309B68DA85C7A800086A1E4D3C62B96AD97FEF24FC429A14C50E762B
                                                                                                                                                                                          SHA-512:27800D0401E8D2028730B9664E9489B6A5182C394C2C05509E195D4471B4ABEFC26C82E9B818E94BD5578109728CD891FFE3C156248706A50D792D12A6CD8C96
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Kuala_Lumpur) {.. {-9223372036854775808 24406 0 LMT}.. {-2177477206 24925 0 SMT}.. {-2038200925 25200 0 +07}.. {-1167634800 26400 1 +0720}.. {-1073028000 26400 0 +0720}.. {-894180000 27000 0 +0730}.. {-879665400 32400 0 +09}.. {-767005200 27000 0 +0730}.. {378664200 28800 0 +08}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):669
                                                                                                                                                                                          Entropy (8bit):4.074079100812583
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2wKPLBDm2OHXoH3UTdMVSSFVM5qGeCiKaFzsBRcerUNwGvULhMXeiCs:MB862HL1mdHXC3UBMxJJo9rphTXUzHHF
                                                                                                                                                                                          MD5:489E706324960E86B6E174D913C72E02
                                                                                                                                                                                          SHA1:C7D77482C0D41F3426FC269B3B6C0575EF0E8C7E
                                                                                                                                                                                          SHA-256:6E35E560675B0B5322474900D4EC8326C504788C1F82E533B09785DEEFF092DF
                                                                                                                                                                                          SHA-512:5CEFD44656C041E59A16481E042EA914E7C003BDE6ADF5F49B57052E91F4F732A91A244BD8BC09EF5DC2640D3210DEE53882717C5C4CBD85CCE44A93B028E9C3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Kuching) {.. {-9223372036854775808 26480 0 LMT}.. {-1383463280 27000 0 +0730}.. {-1167636600 28800 0 +08}.. {-1082448000 30000 1 +08}.. {-1074586800 28800 0 +08}.. {-1050825600 30000 1 +08}.. {-1042964400 28800 0 +08}.. {-1019289600 30000 1 +08}.. {-1011428400 28800 0 +08}.. {-987753600 30000 1 +08}.. {-979892400 28800 0 +08}.. {-956217600 30000 1 +08}.. {-948356400 28800 0 +08}.. {-924595200 30000 1 +08}.. {-916734000 28800 0 +08}.. {-893059200 30000 1 +08}.. {-885198000 28800 0 +08}.. {-879667200 32400 0 +09}.. {-767005200 28800 0 +08}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):173
                                                                                                                                                                                          Entropy (8bit):4.877362838821003
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8t14XHAIgNsM13oOARL/2WFKdQWFK81Fn:SlSWB9vsM3yN14HAIgaM1YOAN/2wKdQ6
                                                                                                                                                                                          MD5:EA1DB4B80CC74CBA024B9BF3734B31F2
                                                                                                                                                                                          SHA1:D8131C093BCA3B378BEC606CFEB56A40CB4E246F
                                                                                                                                                                                          SHA-256:8E0C60A9AA64FB8602EDC35311F7436B04853970A21C1F6C871494A09AAD5787
                                                                                                                                                                                          SHA-512:3B57C9CCC16AA4FE71D275D5EC6A7BC1838841023EE4408158362A7E13E7F1B345F7D95006BC8D2FC270158864E286A1A9364C792F679D5803BD82148399C199
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Riyadh)]} {.. LoadTimeZoneFile Asia/Riyadh..}..set TZData(:Asia/Kuwait) $TZData(:Asia/Riyadh)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):169
                                                                                                                                                                                          Entropy (8bit):4.781739054385376
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8PWXHAIgNz+NOARL/2WFKf+WFKkvn:SlSWB9vsM3yOHAIg1AN/2wKGwKmn
                                                                                                                                                                                          MD5:55DAE27AEAA74FE822338C20B6CDFF68
                                                                                                                                                                                          SHA1:F00EB827DC29EB2063B3A0EDBC39856637C55F33
                                                                                                                                                                                          SHA-256:4308D741C83B263C7C9FB8EC692A7B7B502135E407B265B12EA7EF92523455C0
                                                                                                                                                                                          SHA-512:398EE6015C58BDBBEAB49B74833B938FD84DE1AC6D3B8D095CE772ECA980D9E93F4EBFFFFCEAE7F91E287C8CE4F94B1A078D8E1460C352B7C2018F99915838FF
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Macau)]} {.. LoadTimeZoneFile Asia/Macau..}..set TZData(:Asia/Macao) $TZData(:Asia/Macau)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2217
                                                                                                                                                                                          Entropy (8bit):3.9638741177777868
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5ReCX8Iv3nhPHCvzncCHg9PHjZzH+0HDHN1aHhHNaezHBjHeHsH65H18HDH983lY:5d8u3hfCTcaOrh6qn151Wf3Bogp+nlC
                                                                                                                                                                                          MD5:B184E7403CB7168607D2C9E158F86A3B
                                                                                                                                                                                          SHA1:48B003B8F822BE979FBCB08CBDBFFC617BCF99DB
                                                                                                                                                                                          SHA-256:FBCB92CECB1CB0BC284ADC30D70C5F57B3AFC992136A0D898ABC64490BB700FB
                                                                                                                                                                                          SHA-512:D8C5C67CAEB7C670B7BD1DACC1203C4DEE4DDB16A780F502C4440997CFCFF869E86842EF87C2CD0E0B942941C02A6BC3BDAB7CEAD78B026B68F4A031173400C8
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Macau) {.. {-9223372036854775808 27250 0 LMT}.. {-2056692850 28800 0 CST}.. {-884509200 32400 0 +09}.. {-873280800 36000 1 +09}.. {-855918000 32400 0 +09}.. {-841744800 36000 1 +09}.. {-828529200 32400 0 +10}.. {-765363600 28800 0 CT}.. {-747046800 32400 1 CDT}.. {-733827600 28800 0 CST}.. {-716461200 32400 1 CDT}.. {-697021200 28800 0 CST}.. {-683715600 32400 1 CDT}.. {-667990800 28800 0 CST}.. {-654771600 32400 1 CDT}.. {-636627600 28800 0 CST}.. {-623322000 32400 1 CDT}.. {-605178000 28800 0 CST}.. {-591872400 32400 1 CDT}.. {-573642000 28800 0 CST}.. {-559818000 32400 1 CDT}.. {-541674000 28800 0 CST}.. {-528368400 32400 1 CDT}.. {-510224400 28800 0 CST}.. {-498128400 32400 1 CDT}.. {-478774800 28800 0 CST}.. {-466678800 32400 1 CDT}.. {-446720400 28800 0 CST}.. {-435229200 32400 1 CDT}.. {-415258200 28800 0 CST}.. {-403158600
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2088
                                                                                                                                                                                          Entropy (8bit):3.7643610103361134
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5he9dbbv+OC+jsuwltZQONEa2Ggf3augO8UoxLyHdX/CX6bW4Bv/7NKx/y:5wv+0j6lua2Gg/3gO8UoOZU2Wc/pKo
                                                                                                                                                                                          MD5:F62A89F441C9C17EB99F64223C815651
                                                                                                                                                                                          SHA1:408C38A79E056FF9B03D0DA85114DC015CB66938
                                                                                                                                                                                          SHA-256:0C6EEEB7975A95C2B0678D137E6A735238D244A37FA11078050051511DE499FE
                                                                                                                                                                                          SHA-512:55DC72546BDC26450D5318E9D2819E32A91C27D06A7AF5432BD50F8722C69984BBAA8599055A824D2935D919F0C0AA357687DD9B47F49F213EEE21AF7458FE17
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Magadan) {.. {-9223372036854775808 36192 0 LMT}.. {-1441188192 36000 0 +10}.. {-1247565600 39600 0 +12}.. {354891600 43200 1 +12}.. {370699200 39600 0 +11}.. {386427600 43200 1 +12}.. {402235200 39600 0 +11}.. {417963600 43200 1 +12}.. {433771200 39600 0 +11}.. {449586000 43200 1 +12}.. {465318000 39600 0 +11}.. {481042800 43200 1 +12}.. {496767600 39600 0 +11}.. {512492400 43200 1 +12}.. {528217200 39600 0 +11}.. {543942000 43200 1 +12}.. {559666800 39600 0 +11}.. {575391600 43200 1 +12}.. {591116400 39600 0 +11}.. {606841200 43200 1 +12}.. {622566000 39600 0 +11}.. {638290800 43200 1 +12}.. {654620400 39600 0 +11}.. {670345200 36000 0 +11}.. {670348800 39600 1 +11}.. {686073600 36000 0 +10}.. {695750400 39600 0 +12}.. {701794800 43200 1 +12}.. {717519600 39600 0 +11}.. {733244400 43200 1 +12}.. {748969200 39600 0 +11}.. {76469
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):243
                                                                                                                                                                                          Entropy (8bit):4.737440985553183
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2wK5XDm2OHUVoHxYQTLQTvj1kc3gEpHkH8vScHr0:MB862hTmdHsCLTI6cQe7HHA
                                                                                                                                                                                          MD5:9116C0B70AB33EC49F933EAE0238FD4B
                                                                                                                                                                                          SHA1:BA390E8FBEAF5EA6E861AFC5A51CD4DF0B422461
                                                                                                                                                                                          SHA-256:30D8AB00E32ECE51442C0310E650D89D6989E0809600EE334CB10C506D84BF9D
                                                                                                                                                                                          SHA-512:499E60E8CBDA72226BCB4E241020E62B6F88E7D3E4329D260A6536EF87C02D7D61FD1BECC47D4FF308B4EB5D3E7FFBE2EC1C96FE2DEDC09DD1D973421C5FFE1E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Makassar) {.. {-9223372036854775808 28656 0 LMT}.. {-1577951856 28656 0 MMT}.. {-1172908656 28800 0 +08}.. {-880272000 32400 0 +09}.. {-766054800 28800 0 WITA}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):421
                                                                                                                                                                                          Entropy (8bit):4.48495488773916
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB862GjmdHnCTZBCvEo6AwoucQzy4orjAbomAtoNv:5GjeCVwvB6AduXzylHAMmAa9
                                                                                                                                                                                          MD5:0FBF0ED252638DF31826C33EB3FFBFE2
                                                                                                                                                                                          SHA1:3496E4A5251A9BDF3AA4368297140780B6DBF66D
                                                                                                                                                                                          SHA-256:070D61A0E39643A700ABA89A8A4BE5733BA456958966098405E11ECDFA854D76
                                                                                                                                                                                          SHA-512:2A40E14964B357809E596DF88D8C4141ED78664BACA0A7724A7CA837EF427DC2B07C48D9DBE5787FAB0015673F5BDE002223D489334C5B91B74EEC5507A14B78
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Manila) {.. {-9223372036854775808 -57360 0 LMT}.. {-3944621040 29040 0 LMT}.. {-2229321840 28800 0 PST}.. {-1046678400 32400 1 PDT}.. {-1038733200 28800 0 PST}.. {-873273600 32400 0 JST}.. {-794221200 28800 0 PST}.. {-496224000 32400 1 PDT}.. {-489315600 28800 0 PST}.. {259344000 32400 1 PDT}.. {275151600 28800 0 PST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):170
                                                                                                                                                                                          Entropy (8bit):4.805992552335358
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8DeXHAIgN6S7ARL/2WFKvE+H+WFKQ3n:SlSWB9vsM3yj+HAIgMS7AN/2wKLewKQ3
                                                                                                                                                                                          MD5:8AEB5C3E81069F884A370714E8013F1F
                                                                                                                                                                                          SHA1:4E3DD4A84627E75E84726C0CBA72CA6801280C2B
                                                                                                                                                                                          SHA-256:011B7DE1C9F7EC241B224BC864D8AE66ACB433FBC8AD939E4DBEB12BE6390243
                                                                                                                                                                                          SHA-512:50B1DE2615AE9B4781505DC709F9D07F6221D4E6D7B61D7BDA682377EAD9807F47FF0E933B79823D0DFD9F3647A82CFC28FB41FBB2226ED1D08B76F86FEB45DC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Dubai)]} {.. LoadTimeZoneFile Asia/Dubai..}..set TZData(:Asia/Muscat) $TZData(:Asia/Dubai)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7625
                                                                                                                                                                                          Entropy (8bit):3.7113086720696398
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:R3pv/7V6Aj8aZaNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBKb0l:R3v/AauivBeRF+W35Syrwl9h5j
                                                                                                                                                                                          MD5:2ADD0DFC1F133E4D044727234251A3DC
                                                                                                                                                                                          SHA1:0D1502986258349E384017BA6CB8FA0AC424638C
                                                                                                                                                                                          SHA-256:3C3E4844C70D361893EF022D6C3C8E38B243E91D40C5A726C924355476816F25
                                                                                                                                                                                          SHA-512:70CDD53E7E44EDABF653A4F92EECBF5BB20A31DA95D65209D1CADE7DD9FC68946B8EC8829C28AE00BE5F42AAB545B9282CBBCFC5834437D6A94A179BF4FE0141
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Nicosia) {.. {-9223372036854775808 8008 0 LMT}.. {-1518920008 7200 0 EET}.. {166572000 10800 1 EEST}.. {182293200 7200 0 EET}.. {200959200 10800 1 EEST}.. {213829200 7200 0 EET}.. {228866400 10800 1 EEST}.. {243982800 7200 0 EET}.. {260316000 10800 1 EEST}.. {276123600 7200 0 EET}.. {291765600 10800 1 EEST}.. {307486800 7200 0 EET}.. {323820000 10800 1 EEST}.. {338936400 7200 0 EET}.. {354664800 10800 1 EEST}.. {370386000 7200 0 EET}.. {386114400 10800 1 EEST}.. {401835600 7200 0 EET}.. {417564000 10800 1 EEST}.. {433285200 7200 0 EET}.. {449013600 10800 1 EEST}.. {465339600 7200 0 EET}.. {481068000 10800 1 EEST}.. {496789200 7200 0 EET}.. {512517600 10800 1 EEST}.. {528238800 7200 0 EET}.. {543967200 10800 1 EEST}.. {559688400 7200 0 EET}.. {575416800 10800 1 EEST}.. {591138000 7200 0 EET}.. {606866400 10800 1 EEST}.. {62258760
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2063
                                                                                                                                                                                          Entropy (8bit):3.718004112421892
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:526enddzXJfsFN/3sFrOksF/sF7IyksF7FRZsFLsFTsFcsFk73sFK/XCFKTipnFf:5l40yVRB7VfXucydm46I/CTxwf
                                                                                                                                                                                          MD5:513B6A2AF76DAED9002C037BEC99862F
                                                                                                                                                                                          SHA1:82D1C47BDF46B8B901C35BACACE8595C093BF5F2
                                                                                                                                                                                          SHA-256:96A445D47D834C28480D1E2036ECA4962B35AFA494C219065D4879F71C1830DB
                                                                                                                                                                                          SHA-512:2FE5AF4FA9D6AAB4FBD8E354789B82D39FA1B52394D3A0ABFBC6A30A531E0B7429A3D9AC7835A2843A6E9859E0255565F151FDFC87004ACB4EBD1AAD40BDA8A4
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Novokuznetsk) {.. {-9223372036854775808 20928 0 LMT}.. {-1441259328 21600 0 +06}.. {-1247551200 25200 0 +08}.. {354906000 28800 1 +08}.. {370713600 25200 0 +07}.. {386442000 28800 1 +08}.. {402249600 25200 0 +07}.. {417978000 28800 1 +08}.. {433785600 25200 0 +07}.. {449600400 28800 1 +08}.. {465332400 25200 0 +07}.. {481057200 28800 1 +08}.. {496782000 25200 0 +07}.. {512506800 28800 1 +08}.. {528231600 25200 0 +07}.. {543956400 28800 1 +08}.. {559681200 25200 0 +07}.. {575406000 28800 1 +08}.. {591130800 25200 0 +07}.. {606855600 28800 1 +08}.. {622580400 25200 0 +07}.. {638305200 28800 1 +08}.. {654634800 25200 0 +07}.. {670359600 21600 0 +07}.. {670363200 25200 1 +07}.. {686088000 21600 0 +06}.. {695764800 25200 0 +08}.. {701809200 28800 1 +08}.. {717534000 25200 0 +07}.. {733258800 28800 1 +08}.. {748983600 25200 0 +07}.. {
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2121
                                                                                                                                                                                          Entropy (8bit):3.714792994893581
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:52sve20ruXJfsFN/3sFrOksF/sF7IyksF7FRZsFLsFTsFcsFk73sFK/XCFKTipnF:5Hc40yVRB7VfXu0TKmtTTDOWQ
                                                                                                                                                                                          MD5:AC8C8D768503C8334A9FBAEF4C3A9CAB
                                                                                                                                                                                          SHA1:CA10BB99E2D7AB329229759BD4801068A3AEB6D5
                                                                                                                                                                                          SHA-256:EF799077291F6B3B19E0AEC88F224BB592FAAD09D30740F2376D3D20F2169639
                                                                                                                                                                                          SHA-512:34049B1AC4254F999C3E5AD8CB31ABF88AC2D972E20E19927F33CC59935354F92125A0342A413E64227E8AE29DDFC2FFE5F67AE538C89D8EBAD7FCA889321DFA
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Novosibirsk) {.. {-9223372036854775808 19900 0 LMT}.. {-1579476700 21600 0 +06}.. {-1247551200 25200 0 +08}.. {354906000 28800 1 +08}.. {370713600 25200 0 +07}.. {386442000 28800 1 +08}.. {402249600 25200 0 +07}.. {417978000 28800 1 +08}.. {433785600 25200 0 +07}.. {449600400 28800 1 +08}.. {465332400 25200 0 +07}.. {481057200 28800 1 +08}.. {496782000 25200 0 +07}.. {512506800 28800 1 +08}.. {528231600 25200 0 +07}.. {543956400 28800 1 +08}.. {559681200 25200 0 +07}.. {575406000 28800 1 +08}.. {591130800 25200 0 +07}.. {606855600 28800 1 +08}.. {622580400 25200 0 +07}.. {638305200 28800 1 +08}.. {654634800 25200 0 +07}.. {670359600 21600 0 +07}.. {670363200 25200 1 +07}.. {686088000 21600 0 +06}.. {695764800 25200 0 +08}.. {701809200 28800 1 +08}.. {717534000 25200 0 +07}.. {733258800 28800 1 +08}.. {738090000 25200 0 +07}.. {7
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2055
                                                                                                                                                                                          Entropy (8bit):3.6912374223526396
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5abexPvO1FMnFP1FCnFHnFKqenFdDnFQgOnFxjPnFITnFonFJynFAT4TBThSv0FP:5asvjdqxph01NSvPETKmtTTDO0
                                                                                                                                                                                          MD5:3E06B20B0B62AA09FA03082FAEE4FD62
                                                                                                                                                                                          SHA1:8886EC80528ECA13D3364138BFFE92F881768169
                                                                                                                                                                                          SHA-256:2605CD1E26E4AB48BCB4399BB5B17BAD115A47F87BA3DD54B55BB50C3FE82606
                                                                                                                                                                                          SHA-512:04C1B6A898D12C8EA1B0B2F6665C870434061C63CC8F7A067BFC708E9828BA2E60104B82E2025E42D51DA2F485890C4D34EC0341EF466A7942649BE64F5EEE17
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Omsk) {.. {-9223372036854775808 17610 0 LMT}.. {-1582088010 18000 0 +05}.. {-1247547600 21600 0 +07}.. {354909600 25200 1 +07}.. {370717200 21600 0 +06}.. {386445600 25200 1 +07}.. {402253200 21600 0 +06}.. {417981600 25200 1 +07}.. {433789200 21600 0 +06}.. {449604000 25200 1 +07}.. {465336000 21600 0 +06}.. {481060800 25200 1 +07}.. {496785600 21600 0 +06}.. {512510400 25200 1 +07}.. {528235200 21600 0 +06}.. {543960000 25200 1 +07}.. {559684800 21600 0 +06}.. {575409600 25200 1 +07}.. {591134400 21600 0 +06}.. {606859200 25200 1 +07}.. {622584000 21600 0 +06}.. {638308800 25200 1 +07}.. {654638400 21600 0 +06}.. {670363200 18000 0 +06}.. {670366800 21600 1 +06}.. {686091600 18000 0 +05}.. {695768400 21600 0 +07}.. {701812800 25200 1 +07}.. {717537600 21600 0 +06}.. {733262400 25200 1 +07}.. {748987200 21600 0 +06}.. {76471200
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1664
                                                                                                                                                                                          Entropy (8bit):3.708603813141953
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:53PvalvNhQQvmRKqv0fvzQIovWdvEGvDaDv7w9hYwr:JHaBNKs6b03zB0WJEuDa77w9hYA
                                                                                                                                                                                          MD5:A3BD0C15642AE4F001F98F8E060E8374
                                                                                                                                                                                          SHA1:366F3C7FD4000AC23B79AB0FF4429371ED323B81
                                                                                                                                                                                          SHA-256:933BBCD7AE0BF59A5B4A6E0EF74C237FEEDC42E6A3AEB2158131AA70FBA6FE47
                                                                                                                                                                                          SHA-512:16D8692D3EA96D3594E6220A6989BBFBB926A66EEBEB240C4DC68BE75C69C5206659D9D341D92AE6128928FD38A5F45B445621CBBBA4E4BA8C34C3AC52BF3C08
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Oral) {.. {-9223372036854775808 12324 0 LMT}.. {-1441164324 10800 0 +03}.. {-1247540400 18000 0 +05}.. {354913200 21600 1 +06}.. {370720800 21600 0 +06}.. {386445600 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 14400 0 +04}.. {606866400 18000 1 +04}.. {622591200 14400 0 +04}.. {638316000 18000 1 +04}.. {654645600 14400 0 +04}.. {670370400 18000 1 +04}.. {686095200 14400 0 +04}.. {701816400 14400 0 +04}.. {701820000 18000 1 +04}.. {717544800 14400 0 +04}.. {733269600 18000 1 +04}.. {74899440
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):180
                                                                                                                                                                                          Entropy (8bit):4.958543249401788
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8VLYO5YFfXHAIgN8ELYOJARL/2WFKeHKLNM0WFKELt:SlSWB9vsM3y1LePHAIgKELtAN/2wKTNg
                                                                                                                                                                                          MD5:EBF01E229CC41EB8B27650A3D668EDC1
                                                                                                                                                                                          SHA1:33E1B252C1B45EAE326FCF8CC7C80C78A46F7E8D
                                                                                                                                                                                          SHA-256:DCEE88876D00396918F43DECA421B6C9B02F84B5866A2CE16E641B814B390A9F
                                                                                                                                                                                          SHA-512:80840600F37A256B8FD9933760FBAE7C13DE1E24EFD970E47BE8DEC731DFABF6D6FB76999BEEC775FF8C8B8719E94788ED7EEB04376A34C827ACB443F720F7E3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Bangkok)]} {.. LoadTimeZoneFile Asia/Bangkok..}..set TZData(:Asia/Phnom_Penh) $TZData(:Asia/Bangkok)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):369
                                                                                                                                                                                          Entropy (8bit):4.492596995768464
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2wKT5PDm2OHUeoH99xV/1kc5k/MVSSFFCLkvScH+dMVSSFL1CnF4mMz:MB862L5bmdHFCRV/6c5kMxGLkHHaMxFn
                                                                                                                                                                                          MD5:9ADB1A9E41A143A06116E24EA0A53D90
                                                                                                                                                                                          SHA1:6E50B549E1A705C0090BD5EDE26F7DED78CDF71A
                                                                                                                                                                                          SHA-256:AC8370AEDF5FE3FE1E80710CE117DEE23815BE377D418E4B4F3259A1930E8DBF
                                                                                                                                                                                          SHA-512:92790B20B960AC518AB2E18F902C6E0BA887F268909F5571CAC1068F5E719CCF6943AE6902DA1B683E170658B5E7BE06C6A187C1C0A652DD052D5BD0B2A7B84D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Pontianak) {.. {-9223372036854775808 26240 0 LMT}.. {-1946186240 26240 0 PMT}.. {-1172906240 27000 0 +0730}.. {-881220600 32400 0 +09}.. {-766054800 27000 0 +0730}.. {-683883000 28800 0 +08}.. {-620812800 27000 0 +0730}.. {-189415800 28800 0 WITA}.. {567964800 25200 0 WIB}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):273
                                                                                                                                                                                          Entropy (8bit):4.709411633376997
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2wK8cE4SDm2OHnNoH9Aw8vmVuT0vjLtcjviov:MB8620cExmdHnNCGv2Ezv
                                                                                                                                                                                          MD5:727BBC1A1662B500F616F544A484F213
                                                                                                                                                                                          SHA1:93C1D902D9D4AA4197C7D16C61FB784AC01D0DE5
                                                                                                                                                                                          SHA-256:29BA17F756F5C0BBA30FEBF44E620504D04921C832BD1CB56E1B60EF288B57DF
                                                                                                                                                                                          SHA-512:C3C91E2F180109FF33E6491722F679A1B8DCE8CD31DE006D7FF2CBE270C008E927507C953641D28EE77D139BBEA54DEA1B7DBD6C30B208DDAB1B58756C32AC02
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Pyongyang) {.. {-9223372036854775808 30180 0 LMT}.. {-1948782180 30600 0 KST}.. {-1830414600 32400 0 JST}.. {-768646800 32400 0 KST}.. {1439564400 30600 0 KST}.. {1525446000 32400 0 KST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):176
                                                                                                                                                                                          Entropy (8bit):4.851251407399968
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/2WFKK3ovXMXGm2OHPFV4YoHsQKb3VvVsRYovFFF3FRVGsWr:SlSWB9eg/2wKK3yXDm2OHoYoHxcvSNFS
                                                                                                                                                                                          MD5:CBA9635133F88AD3B27E23B95430C27C
                                                                                                                                                                                          SHA1:5E41232EC03BBC71B522F58CB2D05E6BFFFF1A75
                                                                                                                                                                                          SHA-256:18CCA69F933795CE3F7DB31506EFC063E6CE1DFDCAB32AA387C398456D7F7E1F
                                                                                                                                                                                          SHA-512:D7C43F1F9ADA54C914ADB3CB2C9063EB7044089CFC7755ACFD08828CDEBA3C116AE2BE916ABE5D561E63699B921BC52636DD0BBC2C4304F813616D320D7DDAAF
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Qatar) {.. {-9223372036854775808 12368 0 LMT}.. {-1577935568 14400 0 +04}.. {76190400 10800 0 +03}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1668
                                                                                                                                                                                          Entropy (8bit):3.7299735983334195
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5DwvalvNhQQvmRKqv0fvzQIovWdvEGvDaDvs5vZlovKWyvNSvTqvIQvyovklvqQA:BMaBNKs6b03zB0WJEuDa7sFZiKWaN6TE
                                                                                                                                                                                          MD5:F5DBE4E72FA5AB0019CC98C8E21EC86E
                                                                                                                                                                                          SHA1:27ECB901AA07C18EA7F38235E8EFE0B1635FEFBC
                                                                                                                                                                                          SHA-256:4191629B874C988291E8FD13E675A3ED685D677F6541313975FC4610E47F1DCD
                                                                                                                                                                                          SHA-512:D5EFD4EFFFFE2E41909AEB7B67BD1FA6FAF4B8E9AC645518D5B33BD1B3C5084F59D47D4ED052E0D4B9F9989BDDBA3AECB3D1E67F5237914D24C01F9C95242396
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Qostanay) {.. {-9223372036854775808 15268 0 LMT}.. {-1441167268 14400 0 +04}.. {-1247544000 18000 0 +05}.. {354913200 21600 1 +06}.. {370720800 21600 0 +06}.. {386445600 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 21600 1 +05}.. {622587600 18000 0 +05}.. {638312400 21600 1 +05}.. {654642000 18000 0 +05}.. {670366800 14400 0 +04}.. {670370400 18000 1 +04}.. {686095200 14400 0 +04}.. {695772000 18000 0 +05}.. {701816400 21600 1 +05}.. {717541200 18000 0 +05}.. {733266000 21600 1 +05}.. {7489
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1670
                                                                                                                                                                                          Entropy (8bit):3.734572151642808
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5NvalvNhQQvmRKqv0fvzQIovWdvEGvDaDvs5vZlovKWgvNSvTqvIQvyovklvqQX0:TaBNKs6b03zB0WJEuDa7sFZiKWcN6Tir
                                                                                                                                                                                          MD5:026EC6E479EC006C4398288362254680
                                                                                                                                                                                          SHA1:24AD03DD21DA394B3423D27211955BFD694F8E73
                                                                                                                                                                                          SHA-256:CD6B067AA3EF6935B4E89CA36E6A03FCB97F1E0EE61A7B5D46C06BF4DE140774
                                                                                                                                                                                          SHA-512:023AC55E118F13A31CE996C7BA155C90D47DEB6C223EEB3C0EE7B702871FF0CCA13CDF61D65FDDABE41B888CD7A74274AA5730059CC5688F8ED4DDBF8FE4ECA4
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Qyzylorda) {.. {-9223372036854775808 15712 0 LMT}.. {-1441167712 14400 0 +04}.. {-1247544000 18000 0 +05}.. {354913200 21600 1 +06}.. {370720800 21600 0 +06}.. {386445600 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 21600 1 +05}.. {622587600 18000 0 +05}.. {638312400 21600 1 +05}.. {654642000 18000 0 +05}.. {670366800 14400 0 +04}.. {670370400 18000 1 +04}.. {701812800 18000 0 +05}.. {701816400 21600 1 +05}.. {717541200 18000 0 +05}.. {733266000 21600 1 +05}.. {748990800 18000 0 +05}.. {764
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):174
                                                                                                                                                                                          Entropy (8bit):4.812955128020714
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8nv3vXHAIgNnDA6RL/2WFK02KQMFfh4WFKsyn:SlSWB9vsM3yHvPHAIg15N/2wK0GEJ4wy
                                                                                                                                                                                          MD5:BD3F294F1EDDD21467E980C9F5A0E7DE
                                                                                                                                                                                          SHA1:11A3FC3E4489C18BDF9BFFB4C44615559D9DD99D
                                                                                                                                                                                          SHA-256:E4D2C38D8E7377A528291A88129CDAC40CA4D40A5F1CD8ADB98228527556906E
                                                                                                                                                                                          SHA-512:FA5FD600627793EABB83C1066BE246A47BCCE1FC57830596B9C0CDE8901B949AF178ABDE876C3B73CC3751312E8A4C03C390888B0B5A9669F511344143F83073
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Yangon)]} {.. LoadTimeZoneFile Asia/Yangon..}..set TZData(:Asia/Rangoon) $TZData(:Asia/Yangon)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):148
                                                                                                                                                                                          Entropy (8bit):4.973311159904374
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/2WFK814PMXGm2OHFukeoHqUi9VssWYcv:SlSWB9eg/2wK81GDm2OHF7eoHvi9V1Wr
                                                                                                                                                                                          MD5:AD3236CFF141732831732357AB181EE3
                                                                                                                                                                                          SHA1:EAF51A63898A2048EA5FBE9BA4C001EEE37FFDB2
                                                                                                                                                                                          SHA-256:411E31D09FFA48E44169C42661AE2F7FC142460BCAA216837D8C4740983CA7BD
                                                                                                                                                                                          SHA-512:6CA2D89C02568580786BE98A863453ADCF4D21CAC52E5B44C4F7A05E76D29AEB3E28E353D6FB758BB553DBC8F35389462B388F61E94C68F5DB50A3E8C429336D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Riyadh) {.. {-9223372036854775808 11212 0 LMT}.. {-719636812 10800 0 +03}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):188
                                                                                                                                                                                          Entropy (8bit):4.946090704619887
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8I65eV5XHAIgN2h6560ARL/2WFKwJ6h4WFK365ey:SlSWB9vsM3yJAVJHAIgA4k0AN/2wKl4i
                                                                                                                                                                                          MD5:0766480A295525EE5D65F1ED32094858
                                                                                                                                                                                          SHA1:7A2D68E1009DDD809A4A700931456C617DCD343A
                                                                                                                                                                                          SHA-256:C695981A0DF691C3F4509999FBC52858ADC75024CCCBDEFBE1094FED17E809E4
                                                                                                                                                                                          SHA-512:A21536FB61A64E953E8D6414FF0AEF1BC7E68A33C5DCF7090517A91FC449B96A93A4FBDF2C00682540D1193FDB29603349F5BDB455FD90045FDBCA61247A9860
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Ho_Chi_Minh)]} {.. LoadTimeZoneFile Asia/Ho_Chi_Minh..}..set TZData(:Asia/Saigon) $TZData(:Asia/Ho_Chi_Minh)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2117
                                                                                                                                                                                          Entropy (8bit):3.7276904131666577
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5q+3Vv+0j6lua2Gg/3gO8UoflcXRDhUBAc+:YxIa2GOT8tiXBC6c+
                                                                                                                                                                                          MD5:295D51B8FBBE890C97637687B8F32322
                                                                                                                                                                                          SHA1:7BB72B0EC783898DDF625D275E3BBB964D1693FB
                                                                                                                                                                                          SHA-256:D7D0EA5CEF908442AB0D777A4B097BED18540CD5280FF63F33DD989E27E72908
                                                                                                                                                                                          SHA-512:9B3E3BA01EAE38A00B0EE8A8FB17191CB4ED2EE9E46AE06403BA8C1193804764C86599840DC03E0C6A631456E1BE2BC560BDF6CF0450068EF78A6E494041326C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Sakhalin) {.. {-9223372036854775808 34248 0 LMT}.. {-2031039048 32400 0 +09}.. {-768560400 39600 0 +12}.. {354891600 43200 1 +12}.. {370699200 39600 0 +11}.. {386427600 43200 1 +12}.. {402235200 39600 0 +11}.. {417963600 43200 1 +12}.. {433771200 39600 0 +11}.. {449586000 43200 1 +12}.. {465318000 39600 0 +11}.. {481042800 43200 1 +12}.. {496767600 39600 0 +11}.. {512492400 43200 1 +12}.. {528217200 39600 0 +11}.. {543942000 43200 1 +12}.. {559666800 39600 0 +11}.. {575391600 43200 1 +12}.. {591116400 39600 0 +11}.. {606841200 43200 1 +12}.. {622566000 39600 0 +11}.. {638290800 43200 1 +12}.. {654620400 39600 0 +11}.. {670345200 36000 0 +11}.. {670348800 39600 1 +11}.. {686073600 36000 0 +10}.. {695750400 39600 0 +12}.. {701794800 43200 1 +12}.. {717519600 39600 0 +11}.. {733244400 43200 1 +12}.. {748969200 39600 0 +11}.. {76469
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):879
                                                                                                                                                                                          Entropy (8bit):3.9460497720710506
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5t8eZd7QvalvNhQQvmRKqvzQfv7PQIovWxrvEGvDWdDvs5v/RlovKT10Sv6r:5MvalvNhQQvmRKqv0fvzQIovWdvEGvDO
                                                                                                                                                                                          MD5:10A758996B0DF756E520541BEA9B7D75
                                                                                                                                                                                          SHA1:137E5FD4E00CFA4B3939EF11868862B7F93D87CD
                                                                                                                                                                                          SHA-256:35E4B905723891281D9A6A0A1FD3760A3A48136E1419C686BE31ACE83BF7AA9D
                                                                                                                                                                                          SHA-512:7E32661731EAB2ED8C387533ACCB4853F5B6225BAC11E93247E7B06D7AA856E6A665F63718BFE395CFD00F80A4C16789D7097FFA8DAD88B1D707BF9C155C1D4C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Samarkand) {.. {-9223372036854775808 16073 0 LMT}.. {-1441168073 14400 0 +04}.. {-1247544000 18000 0 +05}.. {354913200 21600 1 +06}.. {370720800 21600 0 +06}.. {386445600 18000 0 +05}.. {386449200 21600 1 +05}.. {402256800 18000 0 +05}.. {417985200 21600 1 +05}.. {433792800 18000 0 +05}.. {449607600 21600 1 +05}.. {465339600 18000 0 +05}.. {481064400 21600 1 +05}.. {496789200 18000 0 +05}.. {512514000 21600 1 +05}.. {528238800 18000 0 +05}.. {543963600 21600 1 +05}.. {559688400 18000 0 +05}.. {575413200 21600 1 +05}.. {591138000 18000 0 +05}.. {606862800 21600 1 +05}.. {622587600 18000 0 +05}.. {638312400 21600 1 +05}.. {654642000 18000 0 +05}.. {670366800 21600 1 +05}.. {686091600 18000 0 +05}.. {694206000 18000 0 +05}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):985
                                                                                                                                                                                          Entropy (8bit):4.121802167517286
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5AemgvHzF+zg2c+z3NGmJhIUfqII8yHg/zoD:5F/nfWUBISHg/G
                                                                                                                                                                                          MD5:A1DE6975DEA70D7241B5B3C43E1EA3AA
                                                                                                                                                                                          SHA1:35EE563A2BCA77C761F7E878997763EA8D258040
                                                                                                                                                                                          SHA-256:C4F82C94650572FE4D03BC1FE54CED8F4BF55DFBEE855D52DE3EA6378240AF93
                                                                                                                                                                                          SHA-512:1639B0609115DBEA6A381986A732A5CA1523952AEF84843B4D714D5B2FF40B16C4166D8D60D31D4FC2C2BA34DED1F6DB39474336195603562265BDBF71687696
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Seoul) {.. {-9223372036854775808 30472 0 LMT}.. {-1948782472 30600 0 KST}.. {-1830414600 32400 0 JST}.. {-767350800 32400 0 KST}.. {-681210000 36000 1 KDT}.. {-672228000 32400 0 KST}.. {-654771600 36000 1 KDT}.. {-640864800 32400 0 KST}.. {-623408400 36000 1 KDT}.. {-609415200 32400 0 KST}.. {-588848400 36000 1 KDT}.. {-577965600 32400 0 KST}.. {-498128400 30600 0 KST}.. {-462702600 34200 1 KDT}.. {-451733400 30600 0 KST}.. {-429784200 34200 1 KDT}.. {-418296600 30600 0 KST}.. {-399544200 34200 1 KDT}.. {-387451800 30600 0 KST}.. {-368094600 34200 1 KDT}.. {-356002200 30600 0 KST}.. {-336645000 34200 1 KDT}.. {-324552600 30600 0 KST}.. {-305195400 34200 1 KDT}.. {-293103000 30600 0 KST}.. {-264933000 32400 0 KST}.. {547578000 36000 1 KDT}.. {560883600 32400 0 KST}.. {579027600 36000 1 KDT}.. {592333200 32400 0 KST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):981
                                                                                                                                                                                          Entropy (8bit):4.16042656890735
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5Te3vvZJzHjwH6kHp7FH32AzHjZBHNHlQHuHxmHUjH6zHj2HBHeC:5ovZZO7lLpT24
                                                                                                                                                                                          MD5:A266AA43A84FD5E4890BC77AA4E240D0
                                                                                                                                                                                          SHA1:CD88C5D451CD7D3F50C9B36FDD47C84D20377441
                                                                                                                                                                                          SHA-256:3AABB42D9EFE95D906B7F34640E7815919A1A20979EBB6EC1527FCAA3B09B22A
                                                                                                                                                                                          SHA-512:13AE48F58C9AF24002F0FE4F28BF96B10EE0ED293E0DE9D29BCEBAAE102B2EA818F42CA4069544A254C95444A48604EC57E6AB2BEBDA4B5E72C82B49E61AD0A0
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Shanghai) {.. {-9223372036854775808 29143 0 LMT}.. {-2177481943 28800 0 CST}.. {-1600675200 32400 1 CDT}.. {-1585904400 28800 0 CST}.. {-933667200 32400 1 CDT}.. {-922093200 28800 0 CST}.. {-908870400 32400 1 CDT}.. {-888829200 28800 0 CST}.. {-881049600 32400 1 CDT}.. {-767869200 28800 0 CST}.. {-745833600 32400 1 CDT}.. {-733827600 28800 0 CST}.. {-716889600 32400 1 CDT}.. {-699613200 28800 0 CST}.. {-683884800 32400 1 CDT}.. {-670669200 28800 0 CST}.. {-652348800 32400 1 CDT}.. {-650016000 28800 0 CST}.. {515527200 32400 1 CDT}.. {527014800 28800 0 CST}.. {545162400 32400 1 CDT}.. {558464400 28800 0 CST}.. {577216800 32400 1 CDT}.. {589914000 28800 0 CST}.. {608666400 32400 1 CDT}.. {621968400 28800 0 CST}.. {640116000 32400 1 CDT}.. {653418000 28800 0 CST}.. {671565600 32400 1 CDT}.. {684867600 28800 0 CST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):372
                                                                                                                                                                                          Entropy (8bit):4.436676898144829
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2wKfbSDm2OHxdoHvm5vWOb/MVSYyF/3MesF5XJSx0dMVSSFF8kvScHS:MB862nbGmdHDCvsvDTMsF/CFDMx/HHbe
                                                                                                                                                                                          MD5:C3D13D921E4C6E475910E5080B761C32
                                                                                                                                                                                          SHA1:8C5AE73C4098D03908E5D567FD7C4D827601D718
                                                                                                                                                                                          SHA-256:05C76B58A4E356FD358E24FBC71FAE98DCB18C441C8D8CBB13A18D4F6E406062
                                                                                                                                                                                          SHA-512:3A620597469D31577ECAAA098C95C244F0C288ABACE9E8964D8641154C1893967EFBD7211A41751D0D4CC1B0B9A2286F11738EFB7D01F110A4826BBE1844A2EA
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Singapore) {.. {-9223372036854775808 24925 0 LMT}.. {-2177477725 24925 0 SMT}.. {-2038200925 25200 0 +07}.. {-1167634800 26400 1 +0720}.. {-1073028000 26400 0 +0720}.. {-894180000 27000 0 +0730}.. {-879665400 32400 0 +09}.. {-767005200 27000 0 +0730}.. {378664200 28800 0 +08}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2064
                                                                                                                                                                                          Entropy (8bit):3.7913177223006698
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5HJeidmbv+OC+jsuwltZQONEa2Ggf3augO8UoxLyHdX/CX6bW4Bv/7NKxwy:5HSv+0j6lua2Gg/3gO8UoOZU2Wc/pKf
                                                                                                                                                                                          MD5:B4FA38E884A85F6BD47C8BB02BB0500C
                                                                                                                                                                                          SHA1:1DD135B79CC0D81C048D7B2C6BE0CF71171DD19E
                                                                                                                                                                                          SHA-256:705D6D8360C2DCD51E909E39E1910FE876145220D151031612DA36B247207395
                                                                                                                                                                                          SHA-512:2D32AAAF1BCC865B5F2810BFE0FB82BE98140BB5F2ECA1DA7FD148A3074DA127B81242F17B8BA9C9E259B61CBB123FD1513CCE6A85C8D7679ADFC0D689B552BB
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Srednekolymsk) {.. {-9223372036854775808 36892 0 LMT}.. {-1441188892 36000 0 +10}.. {-1247565600 39600 0 +12}.. {354891600 43200 1 +12}.. {370699200 39600 0 +11}.. {386427600 43200 1 +12}.. {402235200 39600 0 +11}.. {417963600 43200 1 +12}.. {433771200 39600 0 +11}.. {449586000 43200 1 +12}.. {465318000 39600 0 +11}.. {481042800 43200 1 +12}.. {496767600 39600 0 +11}.. {512492400 43200 1 +12}.. {528217200 39600 0 +11}.. {543942000 43200 1 +12}.. {559666800 39600 0 +11}.. {575391600 43200 1 +12}.. {591116400 39600 0 +11}.. {606841200 43200 1 +12}.. {622566000 39600 0 +11}.. {638290800 43200 1 +12}.. {654620400 39600 0 +11}.. {670345200 36000 0 +11}.. {670348800 39600 1 +11}.. {686073600 36000 0 +10}.. {695750400 39600 0 +12}.. {701794800 43200 1 +12}.. {717519600 39600 0 +11}.. {733244400 43200 1 +12}.. {748969200 39600 0 +11}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1344
                                                                                                                                                                                          Entropy (8bit):4.062084847879695
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5X2eIvZPzGzHjZBHNHlQHKn3HnHNd9HiHkHBHaHLHMtyH9Qm+zHFOzHZ32HZvHiR:5Xi1ypBvt1mwO3Kq46T
                                                                                                                                                                                          MD5:AECA800C8F2A679D0B19E5BB90AFD858
                                                                                                                                                                                          SHA1:2C7DCEB709F9A4312C511971FE1E6A9DC1FBD0E8
                                                                                                                                                                                          SHA-256:389C9D3EE2970665D0D8C5CB61B8B790C5FBDDC0DF0BF2B9753046F5953A477F
                                                                                                                                                                                          SHA-512:C2D6BB4FEB5848D0704647D26F94C0BD8CD7E834AA2187EC9C877E80157E9CC225BBA3BECEE0148894C8639105D292AB50EE95830992BF357C632ACF001E020F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Taipei) {.. {-9223372036854775808 29160 0 LMT}.. {-2335248360 28800 0 CST}.. {-1017820800 32400 0 JST}.. {-766224000 28800 0 CST}.. {-745833600 32400 1 CDT}.. {-733827600 28800 0 CST}.. {-716889600 32400 1 CDT}.. {-699613200 28800 0 CST}.. {-683884800 32400 1 CDT}.. {-670669200 28800 0 CST}.. {-652348800 32400 1 CDT}.. {-639133200 28800 0 CST}.. {-620812800 32400 1 CDT}.. {-607597200 28800 0 CST}.. {-589276800 32400 1 CDT}.. {-576061200 28800 0 CST}.. {-562924800 32400 1 CDT}.. {-541760400 28800 0 CST}.. {-528710400 32400 1 CDT}.. {-510224400 28800 0 CST}.. {-497174400 32400 1 CDT}.. {-478688400 28800 0 CST}.. {-465638400 32400 1 CDT}.. {-449830800 28800 0 CST}.. {-434016000 32400 1 CDT}.. {-418208400 28800 0 CST}.. {-402480000 32400 1 CDT}.. {-386672400 28800 0 CST}.. {-370944000 32400 1 CDT}.. {-355136400 28800 0 CST}.. {-3394080
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):878
                                                                                                                                                                                          Entropy (8bit):3.9280321712564845
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5geQqdNRvOt81FCuLqecDngO6jPvTpYy5T4TXvKT10Sv6r:5+EvdJqxiF0rvK50Sv6r
                                                                                                                                                                                          MD5:DB59DB8E401E12917B7367D5604D3DE6
                                                                                                                                                                                          SHA1:7CC7C5C1DB551BD381B833C81746201D36BC59A9
                                                                                                                                                                                          SHA-256:4445F3F892C7267A6867009CC1A3F0B0548D0240408375A9D15360B28993C2A9
                                                                                                                                                                                          SHA-512:2C7AE63C408A9F06F973AAC16845E1DBE92D15A421BBBE420914F21155AD5E57CD058D7E4427E43185E023D2FF475EBF9D74003ECEF004FF4E5F9D5681ADFB80
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Tashkent) {.. {-9223372036854775808 16631 0 LMT}.. {-1441168631 18000 0 +05}.. {-1247547600 21600 0 +06}.. {354909600 25200 1 +06}.. {370717200 21600 0 +06}.. {386445600 25200 1 +06}.. {402253200 21600 0 +06}.. {417981600 25200 1 +06}.. {433789200 21600 0 +06}.. {449604000 25200 1 +06}.. {465336000 21600 0 +06}.. {481060800 25200 1 +06}.. {496785600 21600 0 +06}.. {512510400 25200 1 +06}.. {528235200 21600 0 +06}.. {543960000 25200 1 +06}.. {559684800 21600 0 +06}.. {575409600 25200 1 +06}.. {591134400 21600 0 +06}.. {606859200 25200 1 +06}.. {622584000 21600 0 +06}.. {638308800 25200 1 +06}.. {654638400 21600 0 +06}.. {670363200 18000 0 +05}.. {670366800 21600 1 +05}.. {686091600 18000 0 +05}.. {694206000 18000 0 +05}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1729
                                                                                                                                                                                          Entropy (8bit):3.6815162494646034
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5yBeqvIdZlykbocXcwJUE5iu8JmFebARoc9lVNk7/9bq8dq16b3C9UPqUsx9Ul4N:5MmsUf8mFpNWFnytO6VnYK
                                                                                                                                                                                          MD5:C376C9ED66F6CC011E063D3E8E0DCED1
                                                                                                                                                                                          SHA1:13C6345F8CB0EC79FE7C78B156C5737BCB66E49E
                                                                                                                                                                                          SHA-256:B637BB0E49144C717E99E93540CB2C4D3695D63B91FE42547F2F0AA006498693
                                                                                                                                                                                          SHA-512:FD60192CBEDC91C5D6B3B5E6F19DEDCAE14DCF48DCAE6D4865A8F0BBDC01CBF8DAAE92C4C46C353AF5B3EEE36CCC87B23F193DDF221132F5404C42507B708364
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Tbilisi) {.. {-9223372036854775808 10751 0 LMT}.. {-2840151551 10751 0 TBMT}.. {-1441162751 10800 0 +03}.. {-405140400 14400 0 +04}.. {354916800 18000 1 +04}.. {370724400 14400 0 +04}.. {386452800 18000 1 +04}.. {402260400 14400 0 +04}.. {417988800 18000 1 +04}.. {433796400 14400 0 +04}.. {449611200 18000 1 +04}.. {465343200 14400 0 +04}.. {481068000 18000 1 +04}.. {496792800 14400 0 +04}.. {512517600 18000 1 +04}.. {528242400 14400 0 +04}.. {543967200 18000 1 +04}.. {559692000 14400 0 +04}.. {575416800 18000 1 +04}.. {591141600 14400 0 +04}.. {606866400 18000 1 +04}.. {622591200 14400 0 +04}.. {638316000 18000 1 +04}.. {654645600 14400 0 +04}.. {670370400 10800 0 +03}.. {670374000 14400 1 +03}.. {686098800 10800 0 +03}.. {694213200 10800 0 +03}.. {701816400 14400 1 +03}.. {717537600 10800 0 +03}.. {733266000 14400 1 +03}.. {748
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7250
                                                                                                                                                                                          Entropy (8bit):3.5278500339429972
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:z73zxgC3kvOR0xV1oLp9ZUj8nZjcJ5NIOFVp7ufbIL74f6IQTExJQtcAL:vryO2H1oLp9aQZyDmIVEPW
                                                                                                                                                                                          MD5:359B270670A5FF61BBCE3D07F1BAA5AB
                                                                                                                                                                                          SHA1:5B6D01C931D31D92299EE4455F76E69EB0C25A96
                                                                                                                                                                                          SHA-256:A78655218A749F4ABCA436BE818E84D3277220FF3E69BE20A786AADF8AC744F9
                                                                                                                                                                                          SHA-512:DFB0C7452AF6124A3742042CD97E7B9C0A84A4E338E00AF6DD66C971BC4D1324D3947A3A8601778F026E50367D942C10513FA1D73742E7006E91BF35E90260BF
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Tehran) {.. {-9223372036854775808 12344 0 LMT}.. {-1704165944 12344 0 TMT}.. {-757394744 12600 0 +0330}.. {247177800 14400 0 +04}.. {259272000 18000 1 +04}.. {277758000 14400 0 +04}.. {283982400 12600 0 +0330}.. {290809800 16200 1 +0330}.. {306531000 12600 0 +0330}.. {322432200 16200 1 +0330}.. {338499000 12600 0 +0330}.. {673216200 16200 1 +0330}.. {685481400 12600 0 +0330}.. {701209800 16200 1 +0330}.. {717103800 12600 0 +0330}.. {732745800 16200 1 +0330}.. {748639800 12600 0 +0330}.. {764281800 16200 1 +0330}.. {780175800 12600 0 +0330}.. {795817800 16200 1 +0330}.. {811711800 12600 0 +0330}.. {827353800 16200 1 +0330}.. {843247800 12600 0 +0330}.. {858976200 16200 1 +0330}.. {874870200 12600 0 +0330}.. {890512200 16200 1 +0330}.. {906406200 12600 0 +0330}.. {922048200 16200 1 +0330}.. {937942200 12600 0 +0330}.. {953584200 16200 1
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):184
                                                                                                                                                                                          Entropy (8bit):4.876713308636272
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq85zFFfXHAIgN0AzFFVHRL/2WFK+TT52WFKYzFgn:SlSWB9vsM3yZbPHAIgCAXRN/2wKsswKR
                                                                                                                                                                                          MD5:40B15013485EE2138A3DCB915F9121E7
                                                                                                                                                                                          SHA1:3ADBE38686C7CA1FDE3DDD12BE908F39BFD1E228
                                                                                                                                                                                          SHA-256:07537A30E6236D9E334DAFD5C4D352D25FDEF95D6DC7496F5D93EFAB74D9EBB1
                                                                                                                                                                                          SHA-512:DA3B7B44B3BEF07CA8AA5253BF684A838181D8A15D7CCF0447A6B5F5BAE28D155CF65BCFB6286EB36C0B9F4FDD1FE862A3297ADB6FC33532B9F766334283D725
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Jerusalem)]} {.. LoadTimeZoneFile Asia/Jerusalem..}..set TZData(:Asia/Tel_Aviv) $TZData(:Asia/Jerusalem)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):176
                                                                                                                                                                                          Entropy (8bit):4.906503135441824
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8kNZ4WXHAIgNqFNKARL/2WFK9Z752WFKvNZovn:SlSWB9vsM3ykZ42HAIgc3KAN/2wKf126
                                                                                                                                                                                          MD5:081862B6FB33389BEC9B0E6B500AA342
                                                                                                                                                                                          SHA1:AF9467BB87C4C28921DF62A87B81223052F9FF4A
                                                                                                                                                                                          SHA-256:37459C17B59639DF62B3F3943751902CE6AAF1F11B7630069DB45052EBEFB5B9
                                                                                                                                                                                          SHA-512:CAF6F1C928528C4471229A2EF2944623545626532986628E6CE38884535286A0B38BA88C1A295E8B11322475D6BFAC61BF89786A76330C1A0C729339A3532BAF
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Thimphu)]} {.. LoadTimeZoneFile Asia/Thimphu..}..set TZData(:Asia/Thimbu) $TZData(:Asia/Thimphu)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):180
                                                                                                                                                                                          Entropy (8bit):4.887493603495978
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/2WFKvNZJMXGm2OHEQUTFnoHqVaJKuc/v6Q61V9gmZVFSTVV:SlSWB9eg/2wKVZJDm2OHEfnoHDKuc/SC
                                                                                                                                                                                          MD5:F239452984CCA9F23E97A880652C39E6
                                                                                                                                                                                          SHA1:52D25282D03B79960F152D21E7492EE26DAEBBAA
                                                                                                                                                                                          SHA-256:B797C74E3840298C3CD8149FC8AA4BCE839EFE79E7C3310986FF23C965607929
                                                                                                                                                                                          SHA-512:1044BEDAE04FCA7BD62937AFCE70F6C447583A90DD1596C3029A64A8251E3F73C106F4D940548DD38E895D67FEFDCD196B257E11437DEB399085EE80C345AA50
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Thimphu) {.. {-9223372036854775808 21516 0 LMT}.. {-706341516 19800 0 +0530}.. {560025000 21600 0 +06}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):388
                                                                                                                                                                                          Entropy (8bit):4.470556147950505
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB862ymdHOx5CvAoK3zoiIxtoFDIe+zT0agbov:5yeOCvARzzCOVa/gby
                                                                                                                                                                                          MD5:3CCC15B63A882DB1B7459A51CD1C8165
                                                                                                                                                                                          SHA1:77A3EFE6E4EE524B9EC6F51593DD7521FD7B8DAD
                                                                                                                                                                                          SHA-256:3DA522FA88541A375D53F30A0B62DC4A305FA0315FEE534B7998C9E0A239450A
                                                                                                                                                                                          SHA-512:15238E96DABAB5D2B9FFD25B3F50417ED32205FA69239D6F6B28DA97A378D669FD409164964D0DD2A5B1D795C8F60E8D4EB15924046348C3D6010646A536E07C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Tokyo) {.. {-9223372036854775808 33539 0 LMT}.. {-2587712400 32400 0 JST}.. {-683802000 36000 1 JDT}.. {-672310800 32400 0 JST}.. {-654771600 36000 1 JDT}.. {-640861200 32400 0 JST}.. {-620298000 36000 1 JDT}.. {-609411600 32400 0 JST}.. {-588848400 36000 1 JDT}.. {-577962000 32400 0 JST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2116
                                                                                                                                                                                          Entropy (8bit):3.695316005718174
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5CeLz/XJfsFN/3sFrOksF/sF7IyksF7FRZsFLsFTsFcsFk73sFK/XCFKTipnFEno:5H040yVRB7VfXucydm4IqtTTDOS
                                                                                                                                                                                          MD5:E95DE93CBCE72C5E02D7ECFE94C96308
                                                                                                                                                                                          SHA1:59A49EBFE544D97545BADFEFE716BB5659C64C20
                                                                                                                                                                                          SHA-256:6B64A01D0F0B5EC7A1410C3BD6883BA7CC133E9F073D40E8BFECE037E3A3FA24
                                                                                                                                                                                          SHA-512:9E33DC9C1C6D60F3226263C484AF46A14AAB31F838516A0D69BA08F8F416EF10D09697E8D7ABAC1CE1F5BCE8AB0C2635D99FBE70C89ECC268DED0DCE89E67466
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Tomsk) {.. {-9223372036854775808 20391 0 LMT}.. {-1578807591 21600 0 +06}.. {-1247551200 25200 0 +08}.. {354906000 28800 1 +08}.. {370713600 25200 0 +07}.. {386442000 28800 1 +08}.. {402249600 25200 0 +07}.. {417978000 28800 1 +08}.. {433785600 25200 0 +07}.. {449600400 28800 1 +08}.. {465332400 25200 0 +07}.. {481057200 28800 1 +08}.. {496782000 25200 0 +07}.. {512506800 28800 1 +08}.. {528231600 25200 0 +07}.. {543956400 28800 1 +08}.. {559681200 25200 0 +07}.. {575406000 28800 1 +08}.. {591130800 25200 0 +07}.. {606855600 28800 1 +08}.. {622580400 25200 0 +07}.. {638305200 28800 1 +08}.. {654634800 25200 0 +07}.. {670359600 21600 0 +07}.. {670363200 25200 1 +07}.. {686088000 21600 0 +06}.. {695764800 25200 0 +08}.. {701809200 28800 1 +08}.. {717534000 25200 0 +07}.. {733258800 28800 1 +08}.. {748983600 25200 0 +07}.. {7647084
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):186
                                                                                                                                                                                          Entropy (8bit):4.897140749162557
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8pYFfXHAIgNzGRRL/2WFKPQOrFJ4WFKov:SlSWB9vsM3yWFPHAIg0RN/2wKPQOrFJD
                                                                                                                                                                                          MD5:F6AE33D706C36FDD8A21F44AD59F5607
                                                                                                                                                                                          SHA1:94D6EC7A437249AEBE2FA4AF8AFB029A620368C0
                                                                                                                                                                                          SHA-256:732751845ACEDBFFD3C6170F4B94CB20B25BFDCFCC5EEA19F4BE439F5C5B573A
                                                                                                                                                                                          SHA-512:2314AB2B154887842211C9A570BC1323D9B4375FF60C96296835DB001E8A277CA62D40B8562BC34EDDF281D96D5325640B79F7907558C6E0319C7D2A76BE239C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Makassar)]} {.. LoadTimeZoneFile Asia/Makassar..}..set TZData(:Asia/Ujung_Pandang) $TZData(:Asia/Makassar)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1590
                                                                                                                                                                                          Entropy (8bit):3.7728141273024374
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5IerIvusF7cCGK6zoCjZte3kzMjsBw0oZzlL98oysHqGzJvqE+ksabzdX+YjL:5VujmUCei46oljFC67
                                                                                                                                                                                          MD5:A4647294401D2B54ABAA8E509BF05A6F
                                                                                                                                                                                          SHA1:BF804CC38996D7715E3BA9BAD715D7ADBED781B9
                                                                                                                                                                                          SHA-256:A56A26981163A717CF388A423CFE7A2BAD1BE8652BE2E338670CBC0C0A70E5E9
                                                                                                                                                                                          SHA-512:B43157FABDE016FA6636CAB7B06CC1DEA53526B42FB46BB41DC4B7E48188D191C325BEF0D170B125E885F321C4316746A8D478D798828E2DC4A51C71DA4A610C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Ulaanbaatar) {.. {-9223372036854775808 25652 0 LMT}.. {-2032931252 25200 0 +07}.. {252435600 28800 0 +08}.. {417974400 32400 1 +08}.. {433782000 28800 0 +08}.. {449596800 32400 1 +08}.. {465318000 28800 0 +08}.. {481046400 32400 1 +08}.. {496767600 28800 0 +08}.. {512496000 32400 1 +08}.. {528217200 28800 0 +08}.. {543945600 32400 1 +08}.. {559666800 28800 0 +08}.. {575395200 32400 1 +08}.. {591116400 28800 0 +08}.. {606844800 32400 1 +08}.. {622566000 28800 0 +08}.. {638294400 32400 1 +08}.. {654620400 28800 0 +08}.. {670348800 32400 1 +08}.. {686070000 28800 0 +08}.. {701798400 32400 1 +08}.. {717519600 28800 0 +08}.. {733248000 32400 1 +08}.. {748969200 28800 0 +08}.. {764697600 32400 1 +08}.. {780418800 28800 0 +08}.. {796147200 32400 1 +08}.. {811868400 28800 0 +08}.. {828201600 32400 1 +08}.. {843922800 28800 0 +08}.. {859
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):192
                                                                                                                                                                                          Entropy (8bit):4.728285544456033
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8TcXkXHAIgNrfcXORL/2WFKhrMEBQWFKucXB:SlSWB9vsM3yXHAIgTN/2wKhrMEewKX
                                                                                                                                                                                          MD5:D2EAEA6182FB332CAA707B523F6C8A9D
                                                                                                                                                                                          SHA1:3BFC654E2B3BCF902AF41AEEC46772C84FFF3890
                                                                                                                                                                                          SHA-256:D17FDAF17B3DAC3A1310E2332F61585598185E64CED799ABD68249EB5B698591
                                                                                                                                                                                          SHA-512:E16BEE28BFE3AFFFE6F0025C09D0D65001F38D5045AAB1B554E4D3A66A88273F985B7BAA11F8D26E76E5ABC9F559E3E4B794CC939AAD5FF012A5A47924D08CB3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Ulaanbaatar)]} {.. LoadTimeZoneFile Asia/Ulaanbaatar..}..set TZData(:Asia/Ulan_Bator) $TZData(:Asia/Ulaanbaatar)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):149
                                                                                                                                                                                          Entropy (8bit):5.006390440264841
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/2WFKjhfMXGm2OHEVPoHsWA0GVFSTVVn:SlSWB9eg/2wKjJDm2OHEVPoH3A0CUX
                                                                                                                                                                                          MD5:D6245CAAEC9BA2579F4CEFFF196A9369
                                                                                                                                                                                          SHA1:4D182953F2CEEFF3583265F977B14F40C1A2FB43
                                                                                                                                                                                          SHA-256:C445B8030DEDDDED0AFF5CC692CC323B63BE8C14BBD42DC3FDE90AD4F9D14785
                                                                                                                                                                                          SHA-512:A32C477B6FAA79247907D1C4E2DF400B05AF4B529277C4CE12B33097872311E3F579115DC8CBA93DAC936928FD574414F3473A9CB7C8E85AB57CCA57489B60F8
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Urumqi) {.. {-9223372036854775808 21020 0 LMT}.. {-1325483420 21600 0 +06}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2058
                                                                                                                                                                                          Entropy (8bit):3.773734429231407
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5petrlfgLv+OC+jsuwltZQONEa2Ggf3augO8UoxLyHdX/CX6bW4Bv/7NKxKG:5Ysv+0j6lua2Gg/3gO8UoOZU2Wc/pKF
                                                                                                                                                                                          MD5:5ADD78E4AFCBA913D078A8790861A2DE
                                                                                                                                                                                          SHA1:BB63A762D5D76C0FD3CB9AB2BCDE95718E1C99EB
                                                                                                                                                                                          SHA-256:9D639C0FC69B3BEEBC96969092F9590EB48E7946E901B225BF245E165973B9A8
                                                                                                                                                                                          SHA-512:7C2418FD1F96F101B83E2ABDF2551405C6E429DBBF30A2FA7CD2477E2CE1CEEBB790C51B28AEFF043BA7A7A914CEF3C812668058D69225B9FE9475C56508453D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Ust-Nera) {.. {-9223372036854775808 34374 0 LMT}.. {-1579426374 28800 0 +08}.. {354898800 43200 0 +12}.. {370699200 39600 0 +11}.. {386427600 43200 1 +12}.. {402235200 39600 0 +11}.. {417963600 43200 1 +12}.. {433771200 39600 0 +11}.. {449586000 43200 1 +12}.. {465318000 39600 0 +11}.. {481042800 43200 1 +12}.. {496767600 39600 0 +11}.. {512492400 43200 1 +12}.. {528217200 39600 0 +11}.. {543942000 43200 1 +12}.. {559666800 39600 0 +11}.. {575391600 43200 1 +12}.. {591116400 39600 0 +11}.. {606841200 43200 1 +12}.. {622566000 39600 0 +11}.. {638290800 43200 1 +12}.. {654620400 39600 0 +11}.. {670345200 36000 0 +11}.. {670348800 39600 1 +11}.. {686073600 36000 0 +10}.. {695750400 39600 0 +12}.. {701794800 43200 1 +12}.. {717519600 39600 0 +11}.. {733244400 43200 1 +12}.. {748969200 39600 0 +11}.. {764694000 43200 1 +12}.. {780418
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):179
                                                                                                                                                                                          Entropy (8bit):4.858039387006872
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8VLYO5YFfXHAIgN8ELYOJARL/2WFKgTjEHp4WFKELt:SlSWB9vsM3y1LePHAIgKELtAN/2wKgsX
                                                                                                                                                                                          MD5:D23A09C84A5368FBB47174BC0A460D14
                                                                                                                                                                                          SHA1:045A72FEA79C75E5F0029BD110E33A022C57DFAB
                                                                                                                                                                                          SHA-256:18F5E4FE8247F676278AC5F1912AC401DC48DF5B756D22E76FF1CFA702F88DA7
                                                                                                                                                                                          SHA-512:404EABC2FC162E18C678CED063249C7FF4C28653880EA1903CE846FD191CD1C5B61E0610736F250B79BBAC768B1AFD6B9A8824D56D74591A95D7301B47D48387
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Bangkok)]} {.. LoadTimeZoneFile Asia/Bangkok..}..set TZData(:Asia/Vientiane) $TZData(:Asia/Bangkok)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2062
                                                                                                                                                                                          Entropy (8bit):3.7094518963173035
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:56beOUYQ7FyDy3le3i96VwAmnuBNuTw6vl9O8nfipRkwhUZDAcD:56cYQBIy343dVNUIukElcXRDhUBAcD
                                                                                                                                                                                          MD5:5C0C094B088D0212182E7B944197D4FE
                                                                                                                                                                                          SHA1:CF43A511FE9CD295207DF350704462E09D4D5278
                                                                                                                                                                                          SHA-256:2558C96E25359C72F168DAC6FB3C16C54F8FD7D0724EEB1671156D4A1F42AC6C
                                                                                                                                                                                          SHA-512:5D659EBDC8C2B06C964B083ECC78B4370A4658590D83F020CD23910C44E2D8DAFE69F61E8EB569E1905E89F38CD03ABE6B92F6CE36CF0B1EE0732A7645AFA65D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Vladivostok) {.. {-9223372036854775808 31651 0 LMT}.. {-1487321251 32400 0 +09}.. {-1247562000 36000 0 +11}.. {354895200 39600 1 +11}.. {370702800 36000 0 +10}.. {386431200 39600 1 +11}.. {402238800 36000 0 +10}.. {417967200 39600 1 +11}.. {433774800 36000 0 +10}.. {449589600 39600 1 +11}.. {465321600 36000 0 +10}.. {481046400 39600 1 +11}.. {496771200 36000 0 +10}.. {512496000 39600 1 +11}.. {528220800 36000 0 +10}.. {543945600 39600 1 +11}.. {559670400 36000 0 +10}.. {575395200 39600 1 +11}.. {591120000 36000 0 +10}.. {606844800 39600 1 +11}.. {622569600 36000 0 +10}.. {638294400 39600 1 +11}.. {654624000 36000 0 +10}.. {670348800 32400 0 +10}.. {670352400 36000 1 +10}.. {686077200 32400 0 +09}.. {695754000 36000 0 +11}.. {701798400 39600 1 +11}.. {717523200 36000 0 +10}.. {733248000 39600 1 +11}.. {748972800 36000 0 +10}.. {7
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2058
                                                                                                                                                                                          Entropy (8bit):3.7081033128260934
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5h+r1gIgWH/lt0irzEzCSCItWiIrW+rDQk9CVhyFY7rRWjYuhUmgr2j:K5PhtjLiII2ZFlgm
                                                                                                                                                                                          MD5:E43E5F0EA7C4575525BAB130984DCDCC
                                                                                                                                                                                          SHA1:2D715749469FEA51A8E25D1F4F8DC4FF9178817D
                                                                                                                                                                                          SHA-256:3BEF13638C46F16435D326C675907E61BB68C8173153CED3359E983BE0E413E5
                                                                                                                                                                                          SHA-512:27954FEC865031BC363CFDE94E97B3B19836A6F777646EA4AAB12ECCAEE6D60A0C690711EA192B917AC717F94A01D1EF64BAE97DF968069CC12415971B070498
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Yakutsk) {.. {-9223372036854775808 31138 0 LMT}.. {-1579423138 28800 0 +08}.. {-1247558400 32400 0 +10}.. {354898800 36000 1 +10}.. {370706400 32400 0 +09}.. {386434800 36000 1 +10}.. {402242400 32400 0 +09}.. {417970800 36000 1 +10}.. {433778400 32400 0 +09}.. {449593200 36000 1 +10}.. {465325200 32400 0 +09}.. {481050000 36000 1 +10}.. {496774800 32400 0 +09}.. {512499600 36000 1 +10}.. {528224400 32400 0 +09}.. {543949200 36000 1 +10}.. {559674000 32400 0 +09}.. {575398800 36000 1 +10}.. {591123600 32400 0 +09}.. {606848400 36000 1 +10}.. {622573200 32400 0 +09}.. {638298000 36000 1 +10}.. {654627600 32400 0 +09}.. {670352400 28800 0 +09}.. {670356000 32400 1 +09}.. {686080800 28800 0 +08}.. {695757600 32400 0 +10}.. {701802000 36000 1 +10}.. {717526800 32400 0 +09}.. {733251600 36000 1 +10}.. {748976400 32400 0 +09}.. {76470
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):244
                                                                                                                                                                                          Entropy (8bit):4.692243303623333
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2wKs5XDm2OHGVQoHvZN6FCDx+UIFDVkvScHbY/s5UIAy:MB862KTmdHGuCvZNNkkHH3Sy
                                                                                                                                                                                          MD5:D45766D30074719C9A88ACE8BB53204B
                                                                                                                                                                                          SHA1:69B333DFCCCCEB66DD0F7DC28B272BB10769B6B0
                                                                                                                                                                                          SHA-256:2526557810747E78E713AE09BC305621A80FAEECF8D441632E7825738D4C79CB
                                                                                                                                                                                          SHA-512:5255DEED72D7D13862A4D6BED7E0458C099D2EF5A1B41536CAA7C0E65A61DE8B8D1AD62AD44559F970B6613ADFB3862778D1CC99B9A05CB5BBCA7F0202B5A5B2
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Yangon) {.. {-9223372036854775808 23087 0 LMT}.. {-2840163887 23087 0 RMT}.. {-1577946287 23400 0 +0630}.. {-873268200 32400 0 +09}.. {-778410000 23400 0 +0630}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2095
                                                                                                                                                                                          Entropy (8bit):3.704641905144701
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5ievNhYvm1qv7vXIovPvSvlDvtvuovKKvKcNvHvAvivBvqvvEyv8vlvEv+v4v+v+:/Nupj40H6l75FKCKcZP8qdyEaoBAWkW+
                                                                                                                                                                                          MD5:D4DABA407BB8A10E4961D1DE5D9781D1
                                                                                                                                                                                          SHA1:6933DE65336331BD90E2BEC6AEA0609B16DAEDC9
                                                                                                                                                                                          SHA-256:2C78699EFC60758B8F8D0D1DEEDFDED5E65C65EBF3082B23E60BDEA8BF8FBCFE
                                                                                                                                                                                          SHA-512:459E2187FAA66414F5CE934C335F563DFD2FA5316B86A54D1A29123A0460AFD65B7CE46629BD6A070A14CB6873A28A2F2803DE5FF4F29EA610712EB07FAD303F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Yekaterinburg) {.. {-9223372036854775808 14553 0 LMT}.. {-1688270553 13505 0 PMT}.. {-1592610305 14400 0 +04}.. {-1247544000 18000 0 +06}.. {354913200 21600 1 +06}.. {370720800 18000 0 +05}.. {386449200 21600 1 +06}.. {402256800 18000 0 +05}.. {417985200 21600 1 +06}.. {433792800 18000 0 +05}.. {449607600 21600 1 +06}.. {465339600 18000 0 +05}.. {481064400 21600 1 +06}.. {496789200 18000 0 +05}.. {512514000 21600 1 +06}.. {528238800 18000 0 +05}.. {543963600 21600 1 +06}.. {559688400 18000 0 +05}.. {575413200 21600 1 +06}.. {591138000 18000 0 +05}.. {606862800 21600 1 +06}.. {622587600 18000 0 +05}.. {638312400 21600 1 +06}.. {654642000 18000 0 +05}.. {670366800 14400 0 +05}.. {670370400 18000 1 +05}.. {686095200 14400 0 +04}.. {695772000 18000 0 +06}.. {701816400 21600 1 +06}.. {717541200 18000 0 +05}.. {733266000 21600 1 +06}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2029
                                                                                                                                                                                          Entropy (8bit):3.6487650030366106
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:5O4GeuadYlykbocXcwJUE5iu8JmFebARoc9lVNk7/9bq8dq16b3C9UPBUUUl2ue/:5xKdsUf8mFpNWFnyLCPYmPJSi3sh4
                                                                                                                                                                                          MD5:2CFA7C55D0731D24679CA5D5DC716381
                                                                                                                                                                                          SHA1:2BB66783D75C71E76409365757980FBC15F53231
                                                                                                                                                                                          SHA-256:20871FA6AA959DDFB73D846271B4A568627B564CFC08A11BDD84B98C2F2019A3
                                                                                                                                                                                          SHA-512:CAB10A48859B2C0B2CC7C56E0AA530AE7E506A4986BADC5ED974D124BD46DB328B50C423F83FCFD52D31962A249EEFC10351798B86D51EDA500F412C8D42E6BC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Asia/Yerevan) {.. {-9223372036854775808 10680 0 LMT}.. {-1441162680 10800 0 +03}.. {-405140400 14400 0 +04}.. {354916800 18000 1 +04}.. {370724400 14400 0 +04}.. {386452800 18000 1 +04}.. {402260400 14400 0 +04}.. {417988800 18000 1 +04}.. {433796400 14400 0 +04}.. {449611200 18000 1 +04}.. {465343200 14400 0 +04}.. {481068000 18000 1 +04}.. {496792800 14400 0 +04}.. {512517600 18000 1 +04}.. {528242400 14400 0 +04}.. {543967200 18000 1 +04}.. {559692000 14400 0 +04}.. {575416800 18000 1 +04}.. {591141600 14400 0 +04}.. {606866400 18000 1 +04}.. {622591200 14400 0 +04}.. {638316000 18000 1 +04}.. {654645600 14400 0 +04}.. {670370400 10800 0 +03}.. {670374000 14400 1 +03}.. {686098800 10800 0 +03}.. {701823600 14400 1 +03}.. {717548400 10800 0 +03}.. {733273200 14400 1 +03}.. {748998000 10800 0 +03}.. {764722800 14400 1 +03}.. {780447
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):9879
                                                                                                                                                                                          Entropy (8bit):3.557602151081988
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:K35nZPOUYySoluItljncxelTMwtrayE6x5sETNek/CyNzybxYKmX6SXL/XbEcygI:K940pb6cL/b3Ldr9Q7TMq+ML
                                                                                                                                                                                          MD5:E7F2A3EE0362E9ED3ECBAD24168AD098
                                                                                                                                                                                          SHA1:98832274F6D9B641B809123D1272A1C04EEAA177
                                                                                                                                                                                          SHA-256:6B3609BE4E93D21A2AB492594EDD387931E2C787E8471C9F2D3A677F34002D8F
                                                                                                                                                                                          SHA-512:C48A76F8251AE455C759CB98802E40B3BEF716FD8E7441B6DE0242942C913367E3572B7C871082E97CA9BE67EC7DC37F8D01C438965217AC0EC36AD508DCE0D4
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/Azores) {.. {-9223372036854775808 -6160 0 LMT}.. {-2713904240 -6872 0 HMT}.. {-1830376800 -7200 0 -02}.. {-1689548400 -3600 1 -01}.. {-1677794400 -7200 0 -02}.. {-1667430000 -3600 1 -01}.. {-1647730800 -7200 0 -02}.. {-1635807600 -3600 1 -01}.. {-1616194800 -7200 0 -02}.. {-1604358000 -3600 1 -01}.. {-1584658800 -7200 0 -02}.. {-1572735600 -3600 1 -01}.. {-1553036400 -7200 0 -02}.. {-1541199600 -3600 1 -01}.. {-1521500400 -7200 0 -02}.. {-1442444400 -3600 1 -01}.. {-1426806000 -7200 0 -02}.. {-1379286000 -3600 1 -01}.. {-1364770800 -7200 0 -02}.. {-1348441200 -3600 1 -01}.. {-1333321200 -7200 0 -02}.. {-1316386800 -3600 1 -01}.. {-1301266800 -7200 0 -02}.. {-1284332400 -3600 1 -01}.. {-1269817200 -7200 0 -02}.. {-1221433200 -3600 1 -01}.. {-1206918000 -7200 0 -02}.. {-1191193200 -3600 1 -01}.. {-1175468400 -7200 0 -02}.. {-1127689
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8784
                                                                                                                                                                                          Entropy (8bit):3.833553120942514
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:ZRBHksL3zq6bCvyjvspNWMPm4bPJWXtRbALtuFW4ng2CEBJuQaeEy9P19OBYEi/+:ft0CC
                                                                                                                                                                                          MD5:B04E22B9B42722013941169B5D04DEA2
                                                                                                                                                                                          SHA1:32B96A7D9504D5022A6C4E2D310E95B5F062947F
                                                                                                                                                                                          SHA-256:099C3BEFBA3B4C00AE19BC53D475A52B32FAC9B36EC823C8EAEFC7D00F78F388
                                                                                                                                                                                          SHA-512:8B93BCA1E923B7A43F2EB0889216E8FF991D13CB8D25BD300310ED7CD8537DBD858E8F422C9B52AE2F52F7C1CB450EF0B7C5C1B3AE547C9C1E18E2A851569DD5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/Bermuda) {.. {-9223372036854775808 -15558 0 LMT}.. {-2524506042 -15558 0 BMT}.. {-1664307642 -11958 1 BMT}.. {-1648932042 -15558 0 BMT}.. {-1632080442 -11958 1 BMT}.. {-1618692042 -15558 0 BST}.. {-1262281242 -14400 0 AT}.. {-882727200 -10800 1 ADT}.. {-858538800 -14400 0 AST}.. {-845229600 -10800 1 ADT}.. {-825879600 -14400 0 AST}.. {-814384800 -10800 1 ADT}.. {-793825200 -14400 0 AST}.. {-782935200 -10800 1 ADT}.. {-762375600 -14400 0 AST}.. {-713988000 -10800 1 ADT}.. {-703710000 -14400 0 AST}.. {-681933600 -10800 1 ADT}.. {-672865200 -14400 0 AST}.. {-650484000 -10800 1 ADT}.. {-641415600 -14400 0 AST}.. {-618429600 -10800 1 ADT}.. {-609966000 -14400 0 AST}.. {-586980000 -10800 1 ADT}.. {-578516400 -14400 0 AST}.. {-555530400 -10800 1 ADT}.. {-546462000 -14400 0 AST}.. {-429127200 -10800 1 ADT}.. {-415825200 -14400 0 AST}.. {1
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):6856
                                                                                                                                                                                          Entropy (8bit):3.8064107143060752
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:KXVuHfXCiZoFtFPIaFF1w0urfva946ZGsE3f2Sf+aCNmSv+kznl4klEp8OT:KXVQbkIaFF1w0us4qE3+sSGjT
                                                                                                                                                                                          MD5:8ABD279386C50705C074EEE18BF5AE59
                                                                                                                                                                                          SHA1:C392231DBE744F5942DA4BFAC8AD0ABEBAEA0BF3
                                                                                                                                                                                          SHA-256:2026944DCDEBC52F64405E35119F4CF97EA9AA1E769498730880B03F29A2B885
                                                                                                                                                                                          SHA-512:3095759D01AC7EEA25E427CA38E8A0395BEFA7250E7A0C1327BF9D61F07F4570CDF7313FBE6695973EB0DD66D201C6C63591CC0DA8A1E0029926DC7056F4C95B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/Canary) {.. {-9223372036854775808 -3696 0 LMT}.. {-1509663504 -3600 0 -01}.. {-733874400 0 0 WET}.. {323827200 3600 1 WEST}.. {338950800 0 0 WET}.. {354675600 3600 1 WEST}.. {370400400 0 0 WET}.. {386125200 3600 1 WEST}.. {401850000 0 0 WET}.. {417574800 3600 1 WEST}.. {433299600 0 0 WET}.. {449024400 3600 1 WEST}.. {465354000 0 0 WET}.. {481078800 3600 1 WEST}.. {496803600 0 0 WET}.. {512528400 3600 1 WEST}.. {528253200 0 0 WET}.. {543978000 3600 1 WEST}.. {559702800 0 0 WET}.. {575427600 3600 1 WEST}.. {591152400 0 0 WET}.. {606877200 3600 1 WEST}.. {622602000 0 0 WET}.. {638326800 3600 1 WEST}.. {654656400 0 0 WET}.. {670381200 3600 1 WEST}.. {686106000 0 0 WET}.. {701830800 3600 1 WEST}.. {717555600 0 0 WET}.. {733280400 3600 1 WEST}.. {749005200 0 0 WET}.. {764730000 3600 1 WEST}.. {780454800 0 0 WET}.. {796179600
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):246
                                                                                                                                                                                          Entropy (8bit):4.637993677747699
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/2RQ7RfDm2OHDoH1JlvQV/FFrR3FcykVvQV/FFf+nmwV:MB86267RLmdHDC1w/FH3FcyL/FomwV
                                                                                                                                                                                          MD5:1581C6470850E0C9DB204975488B1AF8
                                                                                                                                                                                          SHA1:6933ED13F18AD785CEDF0837F86EFAC671297A85
                                                                                                                                                                                          SHA-256:2EA59ACDB5BBDD3C6ABCEEA456838A5CA57371A3D2BB93604B37F998ED8B9D4D
                                                                                                                                                                                          SHA-512:9FFFA013D82CEFF6F447521C19270ECDD71152F23670164423E6013FEC46253C62D2CB79B42630BD786BD113F27369E746CA981DD17E789F7571F473B47247C1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/Cape_Verde) {.. {-9223372036854775808 -5644 0 LMT}.. {-1830376800 -7200 0 -02}.. {-862610400 -3600 1 -01}.. {-764118000 -7200 0 -02}.. {186120000 -3600 0 -01}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):186
                                                                                                                                                                                          Entropy (8bit):4.709193799640151
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqLG4E23vXHAIgvMG4EeRRL/2RQqG4EZrB/4RQqG4E1n:SlSWB9vsM3yCPHAIgvoRN/2RQ1rB/4Ri
                                                                                                                                                                                          MD5:601EB889A87F9CAD6F1DF4D1AB009FAE
                                                                                                                                                                                          SHA1:EB43C253A48755442A67A2408D7E3295549F831C
                                                                                                                                                                                          SHA-256:64FB8CAD17CD36666C7027AAD01344FEF659B13699EEF1942365842F8ED2170E
                                                                                                                                                                                          SHA-512:9CFC4A446ED6A3BEF6C26AE57324F10A970EE2ADD6933130447FAD6A3DB538841F2490DD461AF5776FACD9BD2CDC4A83247DFA6B34802AE844DDC6D4C37B28EA
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Atlantic/Faroe)]} {.. LoadTimeZoneFile Atlantic/Faroe..}..set TZData(:Atlantic/Faeroe) $TZData(:Atlantic/Faroe)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):6796
                                                                                                                                                                                          Entropy (8bit):3.804838552487436
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:96ufXCiZoFtFPIaFF1w0urfva946ZGsE3f2Sf+aCNmSv+kznl4klEp8OT:/bkIaFF1w0us4qE3+sSGjT
                                                                                                                                                                                          MD5:F97CC7EB9C52D00177BFF4715832FCD5
                                                                                                                                                                                          SHA1:CD9DCBB5E6ADD6EA91C8F142957EC229FC7F6DA3
                                                                                                                                                                                          SHA-256:795F438E7F01342D5F25ECCDD09FCE65C03C5D2D561B9B5191301D57EC16B850
                                                                                                                                                                                          SHA-512:9586289FEB6C597160011A47432F0AC40000483FA2E579BD89046EFD33E98DDAD652B792FD80CEDEB4CD87B6439A7B473F25F1B7375BC75353CBAF9F77E1084E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/Faroe) {.. {-9223372036854775808 -1624 0 LMT}.. {-1955748776 0 0 WET}.. {347155200 0 0 WET}.. {354675600 3600 1 WEST}.. {370400400 0 0 WET}.. {386125200 3600 1 WEST}.. {401850000 0 0 WET}.. {417574800 3600 1 WEST}.. {433299600 0 0 WET}.. {449024400 3600 1 WEST}.. {465354000 0 0 WET}.. {481078800 3600 1 WEST}.. {496803600 0 0 WET}.. {512528400 3600 1 WEST}.. {528253200 0 0 WET}.. {543978000 3600 1 WEST}.. {559702800 0 0 WET}.. {575427600 3600 1 WEST}.. {591152400 0 0 WET}.. {606877200 3600 1 WEST}.. {622602000 0 0 WET}.. {638326800 3600 1 WEST}.. {654656400 0 0 WET}.. {670381200 3600 1 WEST}.. {686106000 0 0 WET}.. {701830800 3600 1 WEST}.. {717555600 0 0 WET}.. {733280400 3600 1 WEST}.. {749005200 0 0 WET}.. {764730000 3600 1 WEST}.. {780454800 0 0 WET}.. {796179600 3600 1 WEST}.. {811904400 0 0 WET}.. {828234000 3600
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):180
                                                                                                                                                                                          Entropy (8bit):4.975859213900122
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVyWJooeyXHAIgoqxWJz5RL/2RQqG0EHEcAg/h8Qas:SlSWB9vsM3ymSDSHAIgoXN/2RQaK8Avn
                                                                                                                                                                                          MD5:6EB1E51CDB90E841DC151004E98E80CF
                                                                                                                                                                                          SHA1:CDB1FFF4FDBC7837E10E3725F09626345A82716E
                                                                                                                                                                                          SHA-256:9152D10450CEBCE4AAEA3F3C8A50E4077A881E0B06B193A5886F06A453803112
                                                                                                                                                                                          SHA-512:252648AA76AC0F08ED9BA3CB82E930101B1D2CE37EA979670671909CA8E2C7D838C35A449B0C7C2EF7BBF08C746475EC83403651CFB203E2F56C395CE2640933
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Oslo)]} {.. LoadTimeZoneFile Europe/Oslo..}..set TZData(:Atlantic/Jan_Mayen) $TZData(:Europe/Oslo)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):9709
                                                                                                                                                                                          Entropy (8bit):3.80455694200614
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:hZUiLbMsf/ss0qKd+aKyUXtOZHY1SCOcesoQivoKbFVCdm1rXWNXyCXTOuUbkIaq:hZZDQX1rWJysukysLE3+sSGjT
                                                                                                                                                                                          MD5:AC6647F9B53B5958214EC3F3B78A4D85
                                                                                                                                                                                          SHA1:7355622AF99296F069F73899D5C70941C207F676
                                                                                                                                                                                          SHA-256:B2A0D0DDC26806A05B2BE806CA3F938DB12A3FA40110B8B21FD3F04EFED3A531
                                                                                                                                                                                          SHA-512:07569CA4D5DC6D57D91D6FDC370671A7546B73BA653D094E1B501D33570F7700727AD7FF2A083BC79E9EDE807C47E7A5604BEF5803F290B2F277C51DEF10FA6B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/Madeira) {.. {-9223372036854775808 -4056 0 LMT}.. {-2713906344 -4056 0 FMT}.. {-1830380400 -3600 0 -01}.. {-1689552000 0 1 +00}.. {-1677798000 -3600 0 -01}.. {-1667433600 0 1 +00}.. {-1647734400 -3600 0 -01}.. {-1635811200 0 1 +00}.. {-1616198400 -3600 0 -01}.. {-1604361600 0 1 +00}.. {-1584662400 -3600 0 -01}.. {-1572739200 0 1 +00}.. {-1553040000 -3600 0 -01}.. {-1541203200 0 1 +00}.. {-1521504000 -3600 0 -01}.. {-1442448000 0 1 +00}.. {-1426809600 -3600 0 -01}.. {-1379289600 0 1 +00}.. {-1364774400 -3600 0 -01}.. {-1348444800 0 1 +00}.. {-1333324800 -3600 0 -01}.. {-1316390400 0 1 +00}.. {-1301270400 -3600 0 -01}.. {-1284336000 0 1 +00}.. {-1269820800 -3600 0 -01}.. {-1221436800 0 1 +00}.. {-1206921600 -3600 0 -01}.. {-1191196800 0 1 +00}.. {-1175472000 -3600 0 -01}.. {-1127692800 0 1 +00}.. {-1111968000 -3600 0 -01}.. {-
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2035
                                                                                                                                                                                          Entropy (8bit):3.716074665066009
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:5Fhytu1phYdTclBoLB+Q1utqZu97fKnt91ItLjxkRq2fE4/JQjJuj4csf5J1R8yO:jhytu1phYdTclBoLB+Q1utqZuZfKt91x
                                                                                                                                                                                          MD5:FE3467015B8B226CB9D8077CB1ABF81B
                                                                                                                                                                                          SHA1:665083E753C6860755D669F30DF55333F2740127
                                                                                                                                                                                          SHA-256:E77B9D50AF6C2550CA0517B4A6DE64A8A159AD0C77F1294C4212B6E20221B099
                                                                                                                                                                                          SHA-512:661CA9C1DEDB9CE459215C48AE1409787B39EA025DA897FE8DA5532966FEC28BF86DF4B2794F7DDACFC01064CB9A11737592018C9B5C05045934D237FB1C428B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/Reykjavik) {.. {-9223372036854775808 -5280 0 LMT}.. {-1956609120 -3600 0 -01}.. {-1668211200 0 1 -01}.. {-1647212400 -3600 0 -01}.. {-1636675200 0 1 -01}.. {-1613430000 -3600 0 -01}.. {-1605139200 0 1 -01}.. {-1581894000 -3600 0 -01}.. {-1539561600 0 1 -01}.. {-1531350000 -3600 0 -01}.. {-968025600 0 1 -01}.. {-952293600 -3600 0 -01}.. {-942008400 0 1 -01}.. {-920239200 -3600 0 -01}.. {-909957600 0 1 -01}.. {-888789600 -3600 0 -01}.. {-877903200 0 1 -01}.. {-857944800 -3600 0 -01}.. {-846453600 0 1 -01}.. {-826495200 -3600 0 -01}.. {-815004000 0 1 -01}.. {-795045600 -3600 0 -01}.. {-783554400 0 1 -01}.. {-762991200 -3600 0 -01}.. {-752104800 0 1 -01}.. {-731541600 -3600 0 -01}.. {-717631200 0 1 -01}.. {-700092000 -3600 0 -01}.. {-686181600 0 1 -01}.. {-668642400 -3600 0 -01}.. {-654732000 0 1 -01}.. {-636588000 -3600 0 -01}.
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):160
                                                                                                                                                                                          Entropy (8bit):5.011466665416709
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/2RQqGtlN62/EiMXGm2OHXT14YoHvhFvdQVIyV:SlSWB9eg/2RQrlo2MiDm2OHXqYoHvTFS
                                                                                                                                                                                          MD5:3B310BB8C90CA716DC1AC5A697ACA9CD
                                                                                                                                                                                          SHA1:CD583F49478DCDAD91EF78539502C6FC62945C1E
                                                                                                                                                                                          SHA-256:51BFABCB3388107753A3C1A8CF31118E6627132BAA09B9878D9E7CEDBEBB4886
                                                                                                                                                                                          SHA-512:F593B7A1FAF0EA6B42D5EE86C20C9A8F5CD7ACD9B30EF7755E45ECAFEA8752C32E4CF4BEDF531F494E59D9F0C49CCC6FCA077292E20794AA265DFC0A56DFE579
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/South_Georgia) {.. {-9223372036854775808 -8768 0 LMT}.. {-2524512832 -7200 0 -02}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):189
                                                                                                                                                                                          Entropy (8bit):4.880390141563645
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqss1kovXHAIgNGE4pHRL/2RQqGt4r+DcsS:SlSWB9vsM3y7s3HAIgNT4pHN/2RQr4rV
                                                                                                                                                                                          MD5:2C73A963F515376A46762CE153AAF5C5
                                                                                                                                                                                          SHA1:996C3C93DFAD89EA80AC5DFA1DFBD7CECD9ED28D
                                                                                                                                                                                          SHA-256:1C9CA8966FC8BD0BE70F4A187E17E56FB99139BC88C392E82BA2E23E23111C54
                                                                                                                                                                                          SHA-512:35A9ADC047DB058D71C21FC4ECB57CD14B0D9BA4416506763D1800D72CE6C9E81636F332AAD3533616F05C86F90A60416BD4065C5F832A51AA3DC186218BDCAE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Abidjan)]} {.. LoadTimeZoneFile Africa/Abidjan..}..set TZData(:Atlantic/St_Helena) $TZData(:Africa/Abidjan)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2256
                                                                                                                                                                                          Entropy (8bit):3.662522763865322
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:506KSBSdSs2SbSwGSyPU3lSsS5SGScSo/SkSuShSceS3SBSc7XSiSgSwSd/SJkS6:JKU+Ew0FU1TuhrR//tOIoOjXZfDWSkPR
                                                                                                                                                                                          MD5:77C7ECE4FCBE150069B611C75E8DAA0E
                                                                                                                                                                                          SHA1:22F4E5F15BCA92D8456B70BB36230F2605CA5E1C
                                                                                                                                                                                          SHA-256:F0E99EF01F140CD5AAFE16803A657922207E6F7F6AF10B0AE795790916C302C4
                                                                                                                                                                                          SHA-512:6FB57E8499A587292AFAFA9BD003721572393D5268CAF956230DA76983A112B27D6731BE561A22CCEF84935F43AC988B667C2DC404C157EA8D0E7830FC1A2AB8
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Atlantic/Stanley) {.. {-9223372036854775808 -13884 0 LMT}.. {-2524507716 -13884 0 SMT}.. {-1824235716 -14400 0 -04}.. {-1018209600 -10800 1 -04}.. {-1003093200 -14400 0 -04}.. {-986760000 -10800 1 -04}.. {-971643600 -14400 0 -04}.. {-954705600 -10800 1 -04}.. {-939589200 -14400 0 -04}.. {-923256000 -10800 1 -04}.. {-908139600 -14400 0 -04}.. {-891806400 -10800 1 -04}.. {-876690000 -14400 0 -04}.. {-860356800 -10800 1 -04}.. {420606000 -7200 0 -03}.. {433303200 -7200 1 -03}.. {452052000 -10800 0 -03}.. {464151600 -7200 1 -03}.. {483501600 -10800 0 -03}.. {495597600 -14400 0 -04}.. {495604800 -10800 1 -04}.. {514350000 -14400 0 -04}.. {527054400 -10800 1 -04}.. {545799600 -14400 0 -04}.. {558504000 -10800 1 -04}.. {577249200 -14400 0 -04}.. {589953600 -10800 1 -04}.. {608698800 -14400 0 -04}.. {621403200 -10800 1 -04}.. {640753200 -14400 0 -
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):190
                                                                                                                                                                                          Entropy (8bit):4.862270414049974
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq/xJjLkXHAIgoXjLyFvHRL/2QWCCjpMFBx/h4QWCCj1:SlSWB9vsM3yI9kHAIgmON/2DCeMFB/4d
                                                                                                                                                                                          MD5:2EF41863430897F45E0CBB51E6A44069
                                                                                                                                                                                          SHA1:8E9561060E9509FAF235E5E033FC9C2918E438DB
                                                                                                                                                                                          SHA-256:DF7CBDDCBB2F5926A07D19A35739E5B8DCD9733C037F7D1FF95753C28D574674
                                                                                                                                                                                          SHA-512:9D3A37D64DCCCA28093C30FAB595690D021FACEC15F351A77CA33A779D645D305A2FA031869F0DE3B0404C498C2C321D3D02E4DC592D3C632F6700F5DCB54900
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Sydney)]} {.. LoadTimeZoneFile Australia/Sydney..}..set TZData(:Australia/ACT) $TZData(:Australia/Sydney)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8372
                                                                                                                                                                                          Entropy (8bit):3.894755849491153
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:j8SY62BXovlCyRL8pJXa4NyPaNw0leasxMQ/UvuQPxBFNsLQ2nDs020DdDncIsea:j8X3Xzgl3PaN8asiQ/Uv9UnvtCaRs
                                                                                                                                                                                          MD5:94E1A0C4326D09AF103107E64625CC6C
                                                                                                                                                                                          SHA1:C026565F020EB158309549D98313632BAA79205F
                                                                                                                                                                                          SHA-256:5C43D3152982BCFD5B9F51D0E909CF3A558BED1C270FEFFE030531D38D6F91B7
                                                                                                                                                                                          SHA-512:CA08A8BC0EB740D59650FE0A9E56D9E169348AD0994F2BFFD6CCFBF9CC42E82F892FB719E80C4E2084B5702E9725C651359EE3066BD71BB19397EA83B6A68430
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Adelaide) {.. {-9223372036854775808 33260 0 LMT}.. {-2364110060 32400 0 ACST}.. {-2230189200 34200 0 ACST}.. {-1672558200 37800 1 ACDT}.. {-1665387000 34200 0 ACST}.. {-883639800 37800 1 ACDT}.. {-876123000 34200 0 ACST}.. {-860398200 37800 1 ACDT}.. {-844673400 34200 0 ACST}.. {-828343800 37800 1 ACDT}.. {-813223800 34200 0 ACST}.. {31501800 34200 0 ACST}.. {57688200 37800 1 ACDT}.. {67969800 34200 0 ACST}.. {89137800 37800 1 ACDT}.. {100024200 34200 0 ACST}.. {120587400 37800 1 ACDT}.. {131473800 34200 0 ACST}.. {152037000 37800 1 ACDT}.. {162923400 34200 0 ACST}.. {183486600 37800 1 ACDT}.. {194977800 34200 0 ACST}.. {215541000 37800 1 ACDT}.. {226427400 34200 0 ACST}.. {246990600 37800 1 ACDT}.. {257877000 34200 0 ACST}.. {278440200 37800 1 ACDT}.. {289326600 34200 0 ACST}.. {309889800 37800 1 ACDT}.. {320776200 34200 0 ACST}
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):674
                                                                                                                                                                                          Entropy (8bit):4.32071371733564
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB862ELmdHLOYCvSi0xT0ryRIvUr0obZv:5ELe6dvSi6L
                                                                                                                                                                                          MD5:900B39F1D4AB93A445F37B6C0A8DE3D9
                                                                                                                                                                                          SHA1:DE82800779DCB8094C395B5024BD01FFA3C3BB8C
                                                                                                                                                                                          SHA-256:0D3C39EDAB34A8DB31A658A1549772F7D69EB57565E40AA87B707953A2D854A4
                                                                                                                                                                                          SHA-512:8D115D1D14FE6FF21A4AE77E3AAC075E6A877214E568956B9A4FD2E75A46E458CAA5AE26B483F128B4C62960D73BD7543BC32F22B760059423B3D9ABCBA24B6A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Brisbane) {.. {-9223372036854775808 36728 0 LMT}.. {-2366791928 36000 0 AEST}.. {-1672560000 39600 1 AEDT}.. {-1665388800 36000 0 AEST}.. {-883641600 39600 1 AEDT}.. {-876124800 36000 0 AEST}.. {-860400000 39600 1 AEDT}.. {-844675200 36000 0 AEST}.. {-828345600 39600 1 AEDT}.. {-813225600 36000 0 AEST}.. {31500000 36000 0 AEST}.. {57686400 39600 1 AEDT}.. {67968000 36000 0 AEST}.. {625593600 39600 1 AEDT}.. {636480000 36000 0 AEST}.. {657043200 39600 1 AEDT}.. {667929600 36000 0 AEST}.. {688492800 39600 1 AEDT}.. {699379200 36000 0 AEST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8437
                                                                                                                                                                                          Entropy (8bit):3.902306256303896
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:QZSSY62BXovldRL8q75aANyPaNw0leasxMQ/UvuQPxBFNsLQ2nDs020DdDncIsea:QZSX3X2QfPaN8asiQ/Uv9UnvtCaRs
                                                                                                                                                                                          MD5:1553DAAB804A6C9BB15D711554980D3B
                                                                                                                                                                                          SHA1:5E3161B1FBB4C246DCB5E11ABD94095121CE38ED
                                                                                                                                                                                          SHA-256:734F295BD0B558BDF6178DE62151B8913699D08AB2B1D101C55B8DEBC410074C
                                                                                                                                                                                          SHA-512:06B21886070E39E390ECBD18841B7FDBFCA2C7C8573495D2BAA2B92EB113CD1C73C18D73C49DE3C49572CBCBCBED2FAD3248BC651BEB825A1E089B1DEDEFCBFA
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Broken_Hill) {.. {-9223372036854775808 33948 0 LMT}.. {-2364110748 36000 0 AEST}.. {-2314951200 32400 0 ACST}.. {-2230189200 34200 0 ACST}.. {-1672558200 37800 1 ACDT}.. {-1665387000 34200 0 ACST}.. {-883639800 37800 1 ACDT}.. {-876123000 34200 0 ACST}.. {-860398200 37800 1 ACDT}.. {-844673400 34200 0 ACST}.. {-828343800 37800 1 ACDT}.. {-813223800 34200 0 ACST}.. {31501800 34200 0 ACST}.. {57688200 37800 1 ACDT}.. {67969800 34200 0 ACST}.. {89137800 37800 1 ACDT}.. {100024200 34200 0 ACST}.. {120587400 37800 1 ACDT}.. {131473800 34200 0 ACST}.. {152037000 37800 1 ACDT}.. {162923400 34200 0 ACST}.. {183486600 37800 1 ACDT}.. {194977800 34200 0 ACST}.. {215541000 37800 1 ACDT}.. {226427400 34200 0 ACST}.. {246990600 37800 1 ACDT}.. {257877000 34200 0 ACST}.. {278440200 37800 1 ACDT}.. {289326600 34200 0 ACST}.. {309889800 37800 1
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):195
                                                                                                                                                                                          Entropy (8bit):4.851279484907769
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq/xJjLkXHAIgoXjLyFvHRL/2QWCCjnSV1+QWCCjLBn:SlSWB9vsM3yI9kHAIgmON/2DCcq+DCyB
                                                                                                                                                                                          MD5:8944D3DF8FBECC03A8FB18C3B2DA3B53
                                                                                                                                                                                          SHA1:6B17B38D6560592CA49840C47DB9BDA7E79F9F76
                                                                                                                                                                                          SHA-256:5FE3CED97293FE0573D5ECE0CEF59CE5DDB4C57BC568AE7199E77B01D3ADE17C
                                                                                                                                                                                          SHA-512:907D8BB7EA840E0B3AC683884F2F709A2C06D67CE9258BE46400A0DA63581A9B1403A44FA43E1059BE8F5C7E06F9FA05C176309AD6295317BF14F0E9FA5741E4
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Sydney)]} {.. LoadTimeZoneFile Australia/Sydney..}..set TZData(:Australia/Canberra) $TZData(:Australia/Sydney)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):193
                                                                                                                                                                                          Entropy (8bit):4.79231670095588
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3yI4DVJHAIgxnvVWAN/2DCkx+4DCVDy:MByMjUQVv8At2s4Ky
                                                                                                                                                                                          MD5:0C1DFC0877CE8EB08007B7C2B7AF2D87
                                                                                                                                                                                          SHA1:02F835BE2DA4FCA79DC2A6959BB4EB6ACC8DF708
                                                                                                                                                                                          SHA-256:1DD4EC4ED4F854E2EF6162B2F28C89208710F8EC5AABB95FFA9425D3FBBCAB13
                                                                                                                                                                                          SHA-512:358347045915B7D10940DB15E49528D0C636BEC1BE70129847D0B9D034F9E96E847394D88358E87D98A9E581605A3C2AB917B85FDE1296F290B4194BB7E3FA46
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Hobart)]} {.. LoadTimeZoneFile Australia/Hobart..}..set TZData(:Australia/Currie) $TZData(:Australia/Hobart)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):437
                                                                                                                                                                                          Entropy (8bit):4.508468081487136
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB862pmdHPCvZUjMWpXgda/gd026Xgdvgd+v:5peKvZqMSX+4+56X+v+Q
                                                                                                                                                                                          MD5:A81864B2C0BD7BF81F4FA21F17800059
                                                                                                                                                                                          SHA1:518AC9E040A17083ED3962F4FBB47D1D83764FF7
                                                                                                                                                                                          SHA-256:AC004FD4B3C536406991EC13EBB3E64E0EC0C7B264BC18C0700C8FA545868155
                                                                                                                                                                                          SHA-512:3C24F4C2CC3072B3E820FCC1C68A747DCCBB9481FE743C1555783CC932DCBA44FE4851A732D24EABF62E845474D4E1278F120A04DB7549A18C7C49C31FB8D425
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Darwin) {.. {-9223372036854775808 31400 0 LMT}.. {-2364108200 32400 0 ACST}.. {-2230189200 34200 0 ACST}.. {-1672558200 37800 1 ACDT}.. {-1665387000 34200 0 ACST}.. {-883639800 37800 1 ACDT}.. {-876123000 34200 0 ACST}.. {-860398200 37800 1 ACDT}.. {-844673400 34200 0 ACST}.. {-828343800 37800 1 ACDT}.. {-813223800 34200 0 ACST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):759
                                                                                                                                                                                          Entropy (8bit):4.110997549215461
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB862EmdHvOYCvV2mV22wF2nUV2CF2+V2pCwF21UF2biV2cHVKF25V2VF2cV2tFq:5Eemdvg2wQCKZ4j5c0LVmtH1iknohwQT
                                                                                                                                                                                          MD5:1BC8DBD2E24606EFA49F933034FC0EEF
                                                                                                                                                                                          SHA1:A511695A1B87A689C6BFF65257C11D3962FDDA3D
                                                                                                                                                                                          SHA-256:79D0C770A304360DB33F3D1EF7B3935F1E4E8125893E0DCE683AC35A51302CFB
                                                                                                                                                                                          SHA-512:A839D390D70F22FC833322029B732F3AE68FF48793B07005041BD12322DD6E5D5E5FF31787AA004A507A57F8FC245133891F266C4EF19D49F085E6B412E5B04C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Eucla) {.. {-9223372036854775808 30928 0 LMT}.. {-2337928528 31500 0 +0945}.. {-1672555500 35100 1 +0945}.. {-1665384300 31500 0 +0945}.. {-883637100 35100 1 +0945}.. {-876120300 31500 0 +0945}.. {-860395500 35100 1 +0945}.. {-844670700 31500 0 +0945}.. {-836473500 35100 0 +0945}.. {152039700 35100 1 +0945}.. {162926100 31500 0 +0945}.. {436295700 35100 1 +0945}.. {447182100 31500 0 +0945}.. {690311700 35100 1 +0945}.. {699383700 31500 0 +0945}.. {1165079700 35100 1 +0945}.. {1174756500 31500 0 +0945}.. {1193505300 35100 1 +0945}.. {1206810900 31500 0 +0945}.. {1224954900 35100 1 +0945}.. {1238260500 31500 0 +0945}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8734
                                                                                                                                                                                          Entropy (8bit):3.8515786470328823
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:aOqigkx6WsYyS39nQiAmcO38EJ8i/V9cYgCqMEjKeIZ3wQb25Ly04:aOq05hnQiAmcOM6e0pj
                                                                                                                                                                                          MD5:5E04BF8E1DEBFCC4130FDD1BBD67B2DF
                                                                                                                                                                                          SHA1:796AADCE7BB2FAF5E6FC916C941A4E3DCAFACC9E
                                                                                                                                                                                          SHA-256:D813F6A97BEFC22CA4F24C59EB755D269B9C68A449CC7CF0D2C61F911860EBE7
                                                                                                                                                                                          SHA-512:3A69CF1D1F57D6BD39E5F4DAF76BBB06A749D42BEB29452A0A5BDAA68F5DACC0DF176EDDA7A083F5B5B84FC651926C09D46CAAD2F6C4F1595AB9CCA1A958D653
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Hobart) {.. {-9223372036854775808 35356 0 LMT}.. {-2345795356 36000 0 AEST}.. {-1680508800 39600 1 AEDT}.. {-1665388800 36000 0 AEST}.. {-1646640000 39600 1 AEDT}.. {-1635753600 36000 0 AEST}.. {-1615190400 39600 1 AEDT}.. {-1604304000 36000 0 AEST}.. {-1583920800 36000 0 AEST}.. {-883641600 39600 1 AEDT}.. {-876124800 36000 0 AEST}.. {-860400000 39600 1 AEDT}.. {-844675200 36000 0 AEST}.. {-828345600 39600 1 AEDT}.. {-813225600 36000 0 AEST}.. {-94730400 36000 0 AEST}.. {-71136000 39600 1 AEDT}.. {-55411200 36000 0 AEST}.. {-37267200 39600 1 AEDT}.. {-25776000 36000 0 AEST}.. {-5817600 39600 1 AEDT}.. {5673600 36000 0 AEST}.. {25632000 39600 1 AEDT}.. {37728000 36000 0 AEST}.. {57686400 39600 1 AEDT}.. {67968000 36000 0 AEST}.. {89136000 39600 1 AEDT}.. {100022400 36000 0 AEST}.. {120585600 39600 1 AEDT}.. {131472000 36000 0 AES
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):199
                                                                                                                                                                                          Entropy (8bit):4.912882643701746
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3yIoGEoPHAIgjGg6N/2DCkx/2DCPGUv:MByMjeXV6t2a8v
                                                                                                                                                                                          MD5:425DC7B1E31F4AA41DAD74E3C9AE3562
                                                                                                                                                                                          SHA1:D92A3269F7BF5EC00F082C64CEF6E20C43017180
                                                                                                                                                                                          SHA-256:4D84E4040FBC529C9E0366BB74D0CFADEEEEDA0DFCC6C2C9204DED6C6455CAC3
                                                                                                                                                                                          SHA-512:F3031F16C0D00D9F8A38CD378F599EB3E63F4FF85F120DB38E3013E93F08E6F512D969F164BBC88CD625910FB3E086F3352E5B8FFC1373C3CC98F363FB3FD3F7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Lord_Howe)]} {.. LoadTimeZoneFile Australia/Lord_Howe..}..set TZData(:Australia/LHI) $TZData(:Australia/Lord_Howe)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):824
                                                                                                                                                                                          Entropy (8bit):4.249672335529665
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB862gtmdHVCvCi0xT0ryRIvUr0obbty/ywtUj3yv:5gteMvCi6Xlt8
                                                                                                                                                                                          MD5:504A422280E0459A2126E7CB02F527E6
                                                                                                                                                                                          SHA1:EF61B98EFB1E44EE59020E99A69EA67D6B8ACFC2
                                                                                                                                                                                          SHA-256:01B278309353849CC2FDF62A30E2FF483833D5713CF5E329252738BE6F2C0A84
                                                                                                                                                                                          SHA-512:BFDAAD56D817CD3AAB17DFD0A33EFDD422645BC542ABE269C0F8520E33796DF4F19EAB2E40BFC6C4AF93EF654239B8F2E285639B4662040D865B9C340A23CFAD
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Lindeman) {.. {-9223372036854775808 35756 0 LMT}.. {-2366790956 36000 0 AEST}.. {-1672560000 39600 1 AEDT}.. {-1665388800 36000 0 AEST}.. {-883641600 39600 1 AEDT}.. {-876124800 36000 0 AEST}.. {-860400000 39600 1 AEDT}.. {-844675200 36000 0 AEST}.. {-828345600 39600 1 AEDT}.. {-813225600 36000 0 AEST}.. {31500000 36000 0 AEST}.. {57686400 39600 1 AEDT}.. {67968000 36000 0 AEST}.. {625593600 39600 1 AEDT}.. {636480000 36000 0 AEST}.. {657043200 39600 1 AEDT}.. {667929600 36000 0 AEST}.. {688492800 39600 1 AEDT}.. {699379200 36000 0 AEST}.. {709912800 36000 0 AEST}.. {719942400 39600 1 AEDT}.. {731433600 36000 0 AEST}.. {751996800 39600 1 AEDT}.. {762883200 36000 0 AEST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7764
                                                                                                                                                                                          Entropy (8bit):3.5615258807990537
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:pmz39IyKxb/JbcD9gKniAF23QbNS1fEGXALNbbT2JFJ/FaKaTQ9ZJhRVK:p+cpVKniAF2AbkFKL
                                                                                                                                                                                          MD5:10F983F4683CDE13A1228AC0B04D8513
                                                                                                                                                                                          SHA1:45378BA5949BE53D698108F50FECFF50C9E3D296
                                                                                                                                                                                          SHA-256:76D1F1ED67B8F8D6903789C2FDDF79590A83677972D416F5F3C9687614EC6238
                                                                                                                                                                                          SHA-512:D60D802EF215A33750E4F859657BA12A67084B1E9FCF1B4A7CEEE7B9D816BC2C6670775D93C88EC8380CDD7790AD574133D6F90F0828F848313C26583B2F196A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Lord_Howe) {.. {-9223372036854775808 38180 0 LMT}.. {-2364114980 36000 0 AEST}.. {352216800 37800 0 +1030}.. {372785400 41400 1 +1030}.. {384273000 37800 0 +1030}.. {404839800 41400 1 +1030}.. {415722600 37800 0 +1030}.. {436289400 41400 1 +1030}.. {447172200 37800 0 +1030}.. {467739000 41400 1 +1030}.. {478621800 37800 0 +1030}.. {488984400 37800 0 +1030}.. {499188600 39600 1 +1030}.. {511282800 37800 0 +1030}.. {530033400 39600 1 +1030}.. {542732400 37800 0 +1030}.. {562087800 39600 1 +1030}.. {574786800 37800 0 +1030}.. {594142200 39600 1 +1030}.. {606236400 37800 0 +1030}.. {625591800 39600 1 +1030}.. {636476400 37800 0 +1030}.. {657041400 39600 1 +1030}.. {667926000 37800 0 +1030}.. {688491000 39600 1 +1030}.. {699375600 37800 0 +1030}.. {719940600 39600 1 +1030}.. {731430000 37800 0 +1030}.. {751995000 39600 1 +1030}.. {762
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8341
                                                                                                                                                                                          Entropy (8bit):3.8532171550973526
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:Yyigkp2EUyn8/dnQiAmcO38EJ8i/V9cYgCqMEjKeIZ3wQb25Ly04:Yy3VnQiAmcOM6e0pj
                                                                                                                                                                                          MD5:40D06B80A4A0DB415270EFD9698B97BF
                                                                                                                                                                                          SHA1:1999F0E8C7EBAA11BD21D64D9E07FA911F13C64C
                                                                                                                                                                                          SHA-256:F21B9EA51C0D41BAD0420FE0601E5A4B491FB895856F4BDDF6541D704469D92F
                                                                                                                                                                                          SHA-512:E47D597CC85D177CF2804C44C216EB4C5B74472457F15F697704311A847BF8A051DCAFD26FA61DD689555F35640151E26F25D5DC5319EFEFEA62AD86657A4A95
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Melbourne) {.. {-9223372036854775808 34792 0 LMT}.. {-2364111592 36000 0 AEST}.. {-1672560000 39600 1 AEDT}.. {-1665388800 36000 0 AEST}.. {-883641600 39600 1 AEDT}.. {-876124800 36000 0 AEST}.. {-860400000 39600 1 AEDT}.. {-844675200 36000 0 AEST}.. {-828345600 39600 1 AEDT}.. {-813225600 36000 0 AEST}.. {31500000 36000 0 AEST}.. {57686400 39600 1 AEDT}.. {67968000 36000 0 AEST}.. {89136000 39600 1 AEDT}.. {100022400 36000 0 AEST}.. {120585600 39600 1 AEDT}.. {131472000 36000 0 AEST}.. {152035200 39600 1 AEDT}.. {162921600 36000 0 AEST}.. {183484800 39600 1 AEDT}.. {194976000 36000 0 AEST}.. {215539200 39600 1 AEDT}.. {226425600 36000 0 AEST}.. {246988800 39600 1 AEDT}.. {257875200 36000 0 AEST}.. {278438400 39600 1 AEDT}.. {289324800 36000 0 AEST}.. {309888000 39600 1 AEDT}.. {320774400 36000 0 AEST}.. {341337600 39600 1 AEDT}.
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):190
                                                                                                                                                                                          Entropy (8bit):4.893713405897538
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq/xJjLkXHAIgoXjLyFvHRL/2QWCCjREeQWCCjLBn:SlSWB9vsM3yI9kHAIgmON/2DC5eDCyB
                                                                                                                                                                                          MD5:80B7CDD1EA5A5308CE84C038180005F2
                                                                                                                                                                                          SHA1:B7CA15B58ADA8CA3EB74B7971073022D57D8EE70
                                                                                                                                                                                          SHA-256:73D7C9E207E61ACF8DF7242BDCD84488189033E22A84873A953B65DE02FA1B0B
                                                                                                                                                                                          SHA-512:F627F5FF335600AC9158D6A0D3694AB7E70180177449C17B5605BBF7B1B7F8FB447A9C207F4E1BCB627074DB47B8A66F5D78E03C6DB8FA17F8BDD6AABB331665
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Sydney)]} {.. LoadTimeZoneFile Australia/Sydney..}..set TZData(:Australia/NSW) $TZData(:Australia/Sydney)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):192
                                                                                                                                                                                          Entropy (8bit):4.830368875485429
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq/xJjbvvXHAIgoXjbBvRL/2QWCCjsrQWCCjbi:SlSWB9vsM3yIFHAIg2N/2DCZrDCl
                                                                                                                                                                                          MD5:14CB7EA1C028F457345EBEB8ADDC9237
                                                                                                                                                                                          SHA1:208BF676F56533BA271D1B98363A766DF17CF6F2
                                                                                                                                                                                          SHA-256:A983C9CAD7E542CAED43B083E68CD2B782959A4B54015F374C29250D3ACF9B8D
                                                                                                                                                                                          SHA-512:099F65E5FA705FD7257CF7B8E103905EE313C6D082844F69CCD3F318E3E7F4098B29F952FA0AA28655E1FE290A0FB2E809911088315889DE7CAAF0E04698C2FC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Darwin)]} {.. LoadTimeZoneFile Australia/Darwin..}..set TZData(:Australia/North) $TZData(:Australia/Darwin)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):739
                                                                                                                                                                                          Entropy (8bit):4.31793586514766
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB8623mdHCBdCvmlXz6zezzOz4iaLYvzkzi4zm5fVcBhg8mfev:53eCB0v4+e3Oz4iaLYbkzi4zxhfqw
                                                                                                                                                                                          MD5:01B1A88867472AD60B8F5C0E1648E3ED
                                                                                                                                                                                          SHA1:9975EA750458E8061DD8A83585675CB7E4910CA6
                                                                                                                                                                                          SHA-256:FC1B54CA261074E47A8A486FEAC12DD04D46166D1D2B44163BD8791BEC32D275
                                                                                                                                                                                          SHA-512:20BDFBCD1A5038C81552EBD955F3921DE3447A1F30E64935937768B2B98735AE53049601DCDD2D519646C78E6D03289EB465CFF4F2DADEA7D89A329504C6C475
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Perth) {.. {-9223372036854775808 27804 0 LMT}.. {-2337925404 28800 0 AWST}.. {-1672552800 32400 1 AWDT}.. {-1665381600 28800 0 AWST}.. {-883634400 32400 1 AWDT}.. {-876117600 28800 0 AWST}.. {-860392800 32400 1 AWDT}.. {-844668000 28800 0 AWST}.. {-836470800 32400 0 AWST}.. {152042400 32400 1 AWDT}.. {162928800 28800 0 AWST}.. {436298400 32400 1 AWDT}.. {447184800 28800 0 AWST}.. {690314400 32400 1 AWDT}.. {699386400 28800 0 AWST}.. {1165082400 32400 1 AWDT}.. {1174759200 28800 0 AWST}.. {1193508000 32400 1 AWDT}.. {1206813600 28800 0 AWST}.. {1224957600 32400 1 AWDT}.. {1238263200 28800 0 AWST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):203
                                                                                                                                                                                          Entropy (8bit):4.803539644461131
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3yIaWhSHAIgPWAvN/2DCoRWJvFBx+DC7WN:MByMjL9t2rOvFel
                                                                                                                                                                                          MD5:401B6B2E30EF17BE20212645287EB94B
                                                                                                                                                                                          SHA1:67D15A45C61122CE680B829FE0FA3A1C501A8C8F
                                                                                                                                                                                          SHA-256:DDA669B9BFB3E08FC23CE67030148B9E4740824ADD8DE02580D6AFD31CE05BAB
                                                                                                                                                                                          SHA-512:F4348F8F4FF261C47854725AEE4E14E7E334B3C31496E5C46B0E0041551CB6861380E684E8888AFE9DA7E8E97236AC322B9CE2738EF245E9D46C9681665F83A1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Brisbane)]} {.. LoadTimeZoneFile Australia/Brisbane..}..set TZData(:Australia/Queensland) $TZData(:Australia/Brisbane)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):198
                                                                                                                                                                                          Entropy (8bit):4.752918480727309
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3yIDRpGSHAIgSRrN/2DCa7QDCuRpyn:MByMjdpQYrt23QHpy
                                                                                                                                                                                          MD5:D226A0718185854DFE549E00856AA8D5
                                                                                                                                                                                          SHA1:94EE96FAE259D90C2FDF169DD95BD82B3171FFAE
                                                                                                                                                                                          SHA-256:D9DCFDC377901EC0C0FEB9CEA743C2C1425273F69A1BAA7BF3B74FEC5885B267
                                                                                                                                                                                          SHA-512:7EE29A7235CAAEF4889246B7A2241CA9A0D5D2B2E1D56B20141247C93B8736F17280F0D46004AC4588E137D1E76F661C779C906BBFC2B5F8FA73C19F7657F952
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Adelaide)]} {.. LoadTimeZoneFile Australia/Adelaide..}..set TZData(:Australia/South) $TZData(:Australia/Adelaide)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8338
                                                                                                                                                                                          Entropy (8bit):3.847525715050911
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:AZJigk42/yn8/dnQiAmcO38EJ8i/V9cYgCqMEjKeIZ3wQb25Ly04:AZJuVnQiAmcOM6e0pj
                                                                                                                                                                                          MD5:C0F1776E011C4C86B7709A592E7CA1EB
                                                                                                                                                                                          SHA1:1CA528D529BF4995E145D6E0D87A8752A3577E7F
                                                                                                                                                                                          SHA-256:FC453486325ADE1D31F14087B76D4936F3A6D551ABD1DB6FCAC129BDB043951C
                                                                                                                                                                                          SHA-512:F872182962C2615A35F012ECAB30C88F07C6BEF0261207AD52706DB22D8CDD0DA65723CD801FDA7C548C5EB0ECFC39DD66CC17503BAA3BBB77BFA35D20650E4F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Australia/Sydney) {.. {-9223372036854775808 36292 0 LMT}.. {-2364113092 36000 0 AEST}.. {-1672560000 39600 1 AEDT}.. {-1665388800 36000 0 AEST}.. {-883641600 39600 1 AEDT}.. {-876124800 36000 0 AEST}.. {-860400000 39600 1 AEDT}.. {-844675200 36000 0 AEST}.. {-828345600 39600 1 AEDT}.. {-813225600 36000 0 AEST}.. {31500000 36000 0 AEST}.. {57686400 39600 1 AEDT}.. {67968000 36000 0 AEST}.. {89136000 39600 1 AEDT}.. {100022400 36000 0 AEST}.. {120585600 39600 1 AEDT}.. {131472000 36000 0 AEST}.. {152035200 39600 1 AEDT}.. {162921600 36000 0 AEST}.. {183484800 39600 1 AEDT}.. {194976000 36000 0 AEST}.. {215539200 39600 1 AEDT}.. {226425600 36000 0 AEST}.. {246988800 39600 1 AEDT}.. {257875200 36000 0 AEST}.. {278438400 39600 1 AEDT}.. {289324800 36000 0 AEST}.. {309888000 39600 1 AEDT}.. {320774400 36000 0 AEST}.. {341337600 39600 1 AEDT}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):195
                                                                                                                                                                                          Entropy (8bit):4.777331394201868
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3yI4DVJHAIgxnvVWAN/2DC3neDCVDy:MByMjUQVv8At2+eKy
                                                                                                                                                                                          MD5:9C58D9EFBB03472BBDA76CE2FFAD4BB4
                                                                                                                                                                                          SHA1:30959E3681B64AE26F7FA3957887896C26AF7F19
                                                                                                                                                                                          SHA-256:C94FA7A7640CD00963EE8FF1A3D9DCDA2075408739D998EDBF7CFC998DB764FD
                                                                                                                                                                                          SHA-512:2D6B778217726691F2CB4A4995A8B1AB08DDB7FE4570A3FD04EF54F718F455EF3CBD4EEF1A1BCC99A2088C82A6E89DB455BAF1327CECD6BF608837E50F14A6C1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Hobart)]} {.. LoadTimeZoneFile Australia/Hobart..}..set TZData(:Australia/Tasmania) $TZData(:Australia/Hobart)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):204
                                                                                                                                                                                          Entropy (8bit):4.818875198673406
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3yIvFfkSHAIgoFNNvN/2DCzyQDCMF4:MByMj9fKaNNvt2xQz4
                                                                                                                                                                                          MD5:0B144A2E47C81354BC510BC741DE5150
                                                                                                                                                                                          SHA1:A7396F1741F02C6C208FD1286362E4E0720198B8
                                                                                                                                                                                          SHA-256:DBEF9C5BDD290FEC5FA740D697143332D3CA1FC373CF1DF736F1883AC9BA3298
                                                                                                                                                                                          SHA-512:562B029591F9ADB8C324BA56E849B2B524E91B26D3DB441510194882A8E1E63E6948D041874A00A0A76F29925A1CEAC53DD2AE5D7F23123B6FE919346CBFD8CC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Melbourne)]} {.. LoadTimeZoneFile Australia/Melbourne..}..set TZData(:Australia/Victoria) $TZData(:Australia/Melbourne)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):188
                                                                                                                                                                                          Entropy (8bit):4.831654343064909
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq/xJjXFeyXHAIgoXjrWARL/2QWCCjH0QWCCjQ:SlSWB9vsM3yInHAIgOWAN/2DC00DCt
                                                                                                                                                                                          MD5:5F5916CB038876BE27AA5E2AD74EE085
                                                                                                                                                                                          SHA1:18AC21B638188B542455BA3DA91F958DF1724E68
                                                                                                                                                                                          SHA-256:75ABB7F20C4A0B618138AA190AF33CEAF2A6D2C707DA6C1314E4BFF2F9904F58
                                                                                                                                                                                          SHA-512:ADFD83E292AC1BB5E19255A9B2DA0E3BB9323A5F9B92D458DE34C291D7F9B6CFBBF62AA3351FB320E54F34305DD485ADC72134D21AFA6A27B2B8B7D93DCA2113
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Perth)]} {.. LoadTimeZoneFile Australia/Perth..}..set TZData(:Australia/West) $TZData(:Australia/Perth)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):212
                                                                                                                                                                                          Entropy (8bit):4.918079927018121
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3yIcKlHAIgJK3N/2DCkuM0DC9KM:MByMjcKeJK3t2kVSKM
                                                                                                                                                                                          MD5:BEDEA56FCE4B2F0A3F3E9319856A5560
                                                                                                                                                                                          SHA1:9FD0FE998A003C6B4CCCD00A977153347DE07F55
                                                                                                                                                                                          SHA-256:55A9264D0414644A1BE342106AE86086A6659596DC9322A74FC4D1DDB41F7C60
                                                                                                                                                                                          SHA-512:7C438B72262B99EDEEB31AC95E0135BB722A3B0B049278B6DE67DB5FB501837FB9C03785233B538E83F4B56104F6EA3B3DA0F7C2275E0F78F232161840AA4C63
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Australia/Broken_Hill)]} {.. LoadTimeZoneFile Australia/Broken_Hill..}..set TZData(:Australia/Yancowinna) $TZData(:Australia/Broken_Hill)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):194
                                                                                                                                                                                          Entropy (8bit):4.888429541699473
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7thteSHAIgpth9RN/xWh490th4:MByMYdIp7tQ490I
                                                                                                                                                                                          MD5:A8A7A10DA4321819ED71F891480770F8
                                                                                                                                                                                          SHA1:930674EF7711542D7F471A59C1870D4576E027FD
                                                                                                                                                                                          SHA-256:2F594239A434052D36053A2B3EAB134EADBAD06EB6737E67CF72166DAB157537
                                                                                                                                                                                          SHA-512:C6AD1869A713DDE0E4DE53F7894E5CE0B7AEFDDD7C5C3D83BB5B92FB7D8E20B373A6694045053E1AE8EA98A7B7D0C052EF2C21310E47DC650A7A399A5F73D586
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Rio_Branco)]} {.. LoadTimeZoneFile America/Rio_Branco..}..set TZData(:Brazil/Acre) $TZData(:America/Rio_Branco)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):190
                                                                                                                                                                                          Entropy (8bit):4.875339623736144
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0wKy4oeyXHAIg20wKARL/1bIAJl0IAcGEwKyovn:SlSWB9vsM3y7/rDSHAIgp/AN/xIAE90j
                                                                                                                                                                                          MD5:E0D0EFBEC37E27532B49FF6DD9893DA0
                                                                                                                                                                                          SHA1:9C00993A885AF448E48201A46E17629A7A602FC6
                                                                                                                                                                                          SHA-256:A676562A90FF8587A775F6F0E3BE05D870456A56D25B5330816BF9043C8D475B
                                                                                                                                                                                          SHA-512:AB0E6907F9C0002CA5C050A0069AF013B14BADA08CA4553C96B302C078DF7629D5D7EDE4A19A53DEC6E7B9E6D9857F14EC7A1DB9BC11F2EEC9FFBAC70E129EEE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Noronha)]} {.. LoadTimeZoneFile America/Noronha..}..set TZData(:Brazil/DeNoronha) $TZData(:America/Noronha)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):191
                                                                                                                                                                                          Entropy (8bit):4.948480276987682
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0tQJXveyXHAIg20tQJE6RL/1bJHIAcGEtQJXy:SlSWB9vsM3y7tIGSHAIgpt36N/xR90tF
                                                                                                                                                                                          MD5:FCCB5F44903E1B988A058E5BBF5E163B
                                                                                                                                                                                          SHA1:E1CC03DD4A804C7305D8B0C12D8451D08AE262EA
                                                                                                                                                                                          SHA-256:961FB3AB99A63B1E9704B737EAB2D588B5A39D253A213E175CC678BEDFFD498D
                                                                                                                                                                                          SHA-512:F31C80E4AD6EBE6CB8A3382E0052DC47601D073E8F81375D50241105675AA3AB45433FFD0534524D9992ABE1086C6671D85FF7C72B0D6766EB9984426F608B77
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Sao_Paulo)]} {.. LoadTimeZoneFile America/Sao_Paulo..}..set TZData(:Brazil/East) $TZData(:America/Sao_Paulo)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):182
                                                                                                                                                                                          Entropy (8bit):4.902113962502196
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0znQZF3vXHAIg20znQv5RL/1bbAWVIAcGEznQe:SlSWB9vsM3y7zn+PHAIgpznSN/xn90zN
                                                                                                                                                                                          MD5:9F4B43F4F27D0B7EAC0C5401A1A794B4
                                                                                                                                                                                          SHA1:2A8543B994E93E54BD50EAA78463905E6A8EBE74
                                                                                                                                                                                          SHA-256:0500C9A248C8CE9030EA30D0AF9DD95DC465480BAF60646C0B7C511FA23C6D1F
                                                                                                                                                                                          SHA-512:0ADAF708ACFBD80F4704951EEBC24AD144FD5856997A429279E804F3A7F7F9A8FED41DCEE85BFB1ECDBF1E05137E87E7430186474BCF5DE42067FFC74746F048
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Manaus)]} {.. LoadTimeZoneFile America/Manaus..}..set TZData(:Brazil/West) $TZData(:America/Manaus)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7736
                                                                                                                                                                                          Entropy (8bit):3.7984816540097843
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:09+xKDBb0S274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhlt7:9Ss41sFpM5vwA6Efv03TBZLl
                                                                                                                                                                                          MD5:6DB983AD72FB2A88FC557BE5E873336F
                                                                                                                                                                                          SHA1:C64E988010087ED559A990B3D95078949C9B4D72
                                                                                                                                                                                          SHA-256:E2AEA7CFD428A43D9DB938BCC476623ADC1250BD8057013A7FFF5F89D7FF8EFC
                                                                                                                                                                                          SHA-512:C0A646F80FB2FD42D9146A4FD36CF5A7F62016684F8D5AF80453EC190F4AEA65EDADC5BCF071AE746ABFB43B29C27B2743F2152B6986D41BFDE1617CA774A7C5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:CET) {.. {-9223372036854775808 3600 0 CET}.. {-1693706400 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-938905200 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-766623600 3600 0 CET}.. {228877200 7200 1 CEST}.. {243997200 3600 0 CET}.. {260326800 7200 1 CEST}.. {276051600 3600 0 CET}.. {291776400 7200 1 CEST}.. {307501200 3600 0 CET}.. {323830800 7200 1 CEST}.. {338950800 3600 0 CET}.. {354675600 7200 1 CEST}.. {370400400 3600 0 CET}.. {386125200 7200 1 CEST}.. {401850000 3600 0 CET}.. {417574800 7200 1 CEST}.. {433299600 3600 0 CET}.. {449024400 7200 1 CEST}.. {465354000 3600 0 CET}.. {481078800 7200
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8505
                                                                                                                                                                                          Entropy (8bit):3.8095769056779916
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:e3HgahLi8hbZlNA604qSScBgN+4ctDzIVQ/c/3hNxTh:eQaUqtfA604qSBgI7DBch
                                                                                                                                                                                          MD5:A6F88C55E8613A27DE3E6C25B0672910
                                                                                                                                                                                          SHA1:3B593CC17BF153A6209FC5AACE7B88DA9603BD44
                                                                                                                                                                                          SHA-256:73A9841F233AA657AFB6CED8A86A37D55FE5582DD996B9B28975D218BCCC078F
                                                                                                                                                                                          SHA-512:526A922B1594A2800B03F363F7BFEC29203D4A4F2B49C5F2618469F59176CE4F8AFBA0616B226AC39D308DB05DE7147714D9B6CDBB2EA7373A041A4D47F50E2E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:CST6CDT) {.. {-9223372036854775808 -21600 0 CST}.. {-1633276800 -18000 1 CDT}.. {-1615136400 -21600 0 CST}.. {-1601827200 -18000 1 CDT}.. {-1583686800 -21600 0 CST}.. {-880214400 -18000 1 CWT}.. {-769395600 -18000 1 CPT}.. {-765392400 -21600 0 CST}.. {-84384000 -18000 1 CDT}.. {-68662800 -21600 0 CST}.. {-52934400 -18000 1 CDT}.. {-37213200 -21600 0 CST}.. {-21484800 -18000 1 CDT}.. {-5763600 -21600 0 CST}.. {9964800 -18000 1 CDT}.. {25686000 -21600 0 CST}.. {41414400 -18000 1 CDT}.. {57740400 -21600 0 CST}.. {73468800 -18000 1 CDT}.. {89190000 -21600 0 CST}.. {104918400 -18000 1 CDT}.. {120639600 -21600 0 CST}.. {126691200 -18000 1 CDT}.. {152089200 -21600 0 CST}.. {162374400 -18000 1 CDT}.. {183538800 -21600 0 CST}.. {199267200 -18000 1 CDT}.. {215593200 -21600 0 CST}.. {230716800 -18000 1 CDT}.. {247042800 -21600 0 CST}.. {262771200
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):189
                                                                                                                                                                                          Entropy (8bit):4.804821796604604
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx02NEO/vXHAIg202NEqA6RL/0nalGe2IAcGE2NEOyn:SlSWB9vsM3y7UEOXHAIgpUEqA6N/0af9
                                                                                                                                                                                          MD5:33A04963E70EBF29339204348E0DF874
                                                                                                                                                                                          SHA1:456C0DB88ECE4D180EEE5AE5AEF5FBEB6E977D00
                                                                                                                                                                                          SHA-256:6DC6354D761CBE7820C9186568CAB87AD48CA925507F6A740357195B60E16D87
                                                                                                                                                                                          SHA-512:DF8F46827760BD7EC922C6837E0B6649B4FBD220B79E6F1B67FE3DD8CB3D2D035ECDAF4CF6CE5BDE6DC79C6F7B6EE2B9787AF08A97845CD0D647720A2E78D7EF
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Halifax)]} {.. LoadTimeZoneFile America/Halifax..}..set TZData(:Canada/Atlantic) $TZData(:America/Halifax)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):191
                                                                                                                                                                                          Entropy (8bit):4.863241040396457
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0po/vXHAIg20puFvHRL/0nPQox/h4IAcGEpoyn:SlSWB9vsM3y7pYHAIgppuRN/0d490pl
                                                                                                                                                                                          MD5:97E50CE9FBA3F1A6DFCF333F9E6D592C
                                                                                                                                                                                          SHA1:EE472C411079E788DBF32FAC9C5B7EE121960DC2
                                                                                                                                                                                          SHA-256:DB32E83949D62478D229E9FB57BB1624D21B3A9CCEE4CD55335F8262C01D820A
                                                                                                                                                                                          SHA-512:D547E3DC03848A677BE67F7CF4124E067F76EE09BB724A5B10F028BEA72C1526B17678A035B2C53F69498E9ECAACD3C5445D42B7FE58DF706DD2C5F2ADA05A73
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Winnipeg)]} {.. LoadTimeZoneFile America/Winnipeg..}..set TZData(:Canada/Central) $TZData(:America/Winnipeg)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):195
                                                                                                                                                                                          Entropy (8bit):4.90775999333305
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7hzi2HAIgphznN/0L5d490hzyv:MByMYhiXphntyQ90hyv
                                                                                                                                                                                          MD5:E4114CC94C5C1DDF98535BF2B25BF109
                                                                                                                                                                                          SHA1:212BE0FEF7039C0CDB8AF509927F4C03D8F72D22
                                                                                                                                                                                          SHA-256:27CCEB515F9B2AB2D441F7C1533064AD13C89A6A009C3F2F14842B217075E231
                                                                                                                                                                                          SHA-512:06C946DC79190F1C0FAF7F1F41BBEE4EE2A40910913896DE5AA94BC848DAB60F4F40A999CA4218FE1AA499854CCDD9379C937A9DEF273B2C7A352D8CAB8A5FE2
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Regina)]} {.. LoadTimeZoneFile America/Regina..}..set TZData(:Canada/East-Saskatchewan) $TZData(:America/Regina)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):188
                                                                                                                                                                                          Entropy (8bit):4.758562813220951
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0qMKLRXnXHAIg20qMKLRE6RL/0nbHboxp4IAcGEqM:SlSWB9vsM3y7RQtHAIgpRQPN/0Dboxpp
                                                                                                                                                                                          MD5:4365BEFA3D50EEE20843EF97A095E512
                                                                                                                                                                                          SHA1:7756049B4CD6459742686925E9516E64A9727306
                                                                                                                                                                                          SHA-256:22844994AE893F3236A091B050E932E84A5218EC0D01F72595E17CCC471FA564
                                                                                                                                                                                          SHA-512:CB265E79DF926026BEBF7158590369ABE5353C759540F509ABBA2A7ADBE59A705BC2AB936F400614BE610EDB761DE9A2B1E179A0A8B0A87E595392362C2516AA
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Toronto)]} {.. LoadTimeZoneFile America/Toronto..}..set TZData(:Canada/Eastern) $TZData(:America/Toronto)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):192
                                                                                                                                                                                          Entropy (8bit):4.8181126338833655
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx07nKL50vXHAIg207nKLyRRL/0nNYLo/4IAcGE7nK1:SlSWB9vsM3y77G2HAIgp7bN/0W8/4908
                                                                                                                                                                                          MD5:FA0D0024AD72CCE4EC7229FA897FB1B7
                                                                                                                                                                                          SHA1:4373A07F2674FE974189CC801987652AA97F0204
                                                                                                                                                                                          SHA-256:D7A203E60FF19DCDEAAD14121720DE51DA73392D25B40FFA301C1935CDF89517
                                                                                                                                                                                          SHA-512:82EF7F429604A69734B04D298B4C9C9AC3BE57B9DD8C4CECF59C7AB3470BDFBA0505886C4E6AA3864F5EC7FBB4C69C54CF153A6417376828234833013C29A0C1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Edmonton)]} {.. LoadTimeZoneFile America/Edmonton..}..set TZData(:Canada/Mountain) $TZData(:America/Edmonton)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):196
                                                                                                                                                                                          Entropy (8bit):4.998628928230972
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7tgYJHAIgptVN/0xdBx+90twv:MByMYnKpTt590g
                                                                                                                                                                                          MD5:A2DCCB8BFC65DD4E7C3BB7F10DCEFF11
                                                                                                                                                                                          SHA1:6FD2F4FAE06C5D4D3F189A167A98AA76497569DD
                                                                                                                                                                                          SHA-256:87F42F45FD7D059CA47650D445420DE8320F3A7C1CBC7671FBFA8A8881274433
                                                                                                                                                                                          SHA-512:F42E32C5BD785BA914E5054784BF67DDF951460A708290D1899621CEEDC63475B584FC052A86A3B6D45BF3C651D42427FB6F9CE2A2A33764DFFF731053BECC16
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/St_Johns)]} {.. LoadTimeZoneFile America/St_Johns..}..set TZData(:Canada/Newfoundland) $TZData(:America/St_Johns)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):194
                                                                                                                                                                                          Entropy (8bit):4.887587766811186
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7ZLgXPHAIgpZLgFN/0N290ZLgK:MByMY13p1stx901/
                                                                                                                                                                                          MD5:68900CE38FE0E40578323BBD3D75184E
                                                                                                                                                                                          SHA1:9D5EAB5CBCD495DD46974207FBE354A81DD2070F
                                                                                                                                                                                          SHA-256:5C4FD46054B190A6D4B92585B4DAE4E3A8233EE2996D14472835DDD264911DC6
                                                                                                                                                                                          SHA-512:3EF53F0FCD8D88A1B977886BDFAA03D7B84EF021AC6BEDF7C571BFBF2242BFC3F3EB6A6B6A9C2F6852AF412A96DFBC30F3BB25A6619CBCD8736F3DF5B64DE1BF
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Vancouver)]} {.. LoadTimeZoneFile America/Vancouver..}..set TZData(:Canada/Pacific) $TZData(:America/Vancouver)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):190
                                                                                                                                                                                          Entropy (8bit):4.887593462838566
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0sAzE5Y5XHAIg20sAzEo5RL/0nogS64IAcGEsAzEB:SlSWB9vsM3y7hzi2HAIgphznN/0Hd499
                                                                                                                                                                                          MD5:A4237BDCAF68B0EFECA97178F3DEE724
                                                                                                                                                                                          SHA1:A9CBC02B5545A63A0C9B38C8FA7FA2DE6D483188
                                                                                                                                                                                          SHA-256:46BA00AE3A07A4DC83D6CB517D87C9CBBA491B3421FE9AD6C74CAC5695EB73F7
                                                                                                                                                                                          SHA-512:832BF256BE8CB2DD205DDE50017448D5830B46FF4DCA77BDB852067EE0C9DF9977014F2A3E3DD6944336158D8EA377CFBBE519EE5B56FB26EB64325B45476B9D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Regina)]} {.. LoadTimeZoneFile America/Regina..}..set TZData(:Canada/Saskatchewan) $TZData(:America/Regina)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):195
                                                                                                                                                                                          Entropy (8bit):4.889486451014262
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7peR2fkSHAIgppeR2rN/0CF/490peR24:MByMYkGk7pkOtBQ90kB
                                                                                                                                                                                          MD5:490D99BD5465CBF5A8FE28F33180B8A6
                                                                                                                                                                                          SHA1:4783295C31A804BE98145270ED28956A0783E655
                                                                                                                                                                                          SHA-256:A1B1AF37DC89C6BA663E4E967A18409AE4E0FA9EF1B908D0461368DA31001C09
                                                                                                                                                                                          SHA-512:9F6B4F204A21B69E1DFCB766C0671D3736414C73269DCEDCDB4FC3DBA869BBA1511DF6B5061F8964F0AF9C3816133D04E5DFB8A6AD07CA06E7712787A8FECC5A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Whitehorse)]} {.. LoadTimeZoneFile America/Whitehorse..}..set TZData(:Canada/Yukon) $TZData(:America/Whitehorse)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):194
                                                                                                                                                                                          Entropy (8bit):4.812019117774239
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7tfEJkHAIgptfEJo5N/0rHM490tfEJB:MByMYE9pEOt4X90EB
                                                                                                                                                                                          MD5:6EF54792279C249B16877100682F1806
                                                                                                                                                                                          SHA1:A62629EA055207D917740E3AEF4F0B005EA49CC4
                                                                                                                                                                                          SHA-256:5B40167DD0C0B5C293861070C4AC249F78DDF8BAD798DD0165E3AE894C9B9570
                                                                                                                                                                                          SHA-512:3CF93003C3EA2B4386660F0C87074F9AE2BAC4EE72D88451DCB1EA8B79502D2187B1608B6D5CE8D7EDC00AED99CF9DB7B006EB6ED2A2B5009F2C0E757D282D74
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Santiago)]} {.. LoadTimeZoneFile America/Santiago..}..set TZData(:Chile/Continental) $TZData(:America/Santiago)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):189
                                                                                                                                                                                          Entropy (8bit):4.808907056781067
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG7ZAJWXHAIgObT7ZAiFvRL/0bxOdBx/nUDH7ZAZv:SlSWB9vsM3ycJAUHAIgObJAiRN/04dBn
                                                                                                                                                                                          MD5:2EC4FDD1EFBAF1D9F9DBAC8B1B5EDD09
                                                                                                                                                                                          SHA1:FECED8EBC7B666628B7B45C9694FCB3A0B20A42A
                                                                                                                                                                                          SHA-256:1E2DA1862E0E0F131B7C6EB12FAC5F920852C61C162993A30BC843A464A5AAD4
                                                                                                                                                                                          SHA-512:74D61141505BAF1ABAD61FB91941C63C169EFE3C85829FEBB4D29A72EA54D1A07EC84E2E9B48E963E65CBF7663245459FAD288D620B1BEFFE682A2D1C243794D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Easter)]} {.. LoadTimeZoneFile Pacific/Easter..}..set TZData(:Chile/EasterIsland) $TZData(:Pacific/Easter)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):175
                                                                                                                                                                                          Entropy (8bit):4.857134440822812
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx02TEMVFfXHAIg202TEyRRL/0lIAcGE2TEMy:SlSWB9vsM3y76EkHAIgp6EyRN/0l9068
                                                                                                                                                                                          MD5:3FB16EA4A9B0529220133C4A7B05215B
                                                                                                                                                                                          SHA1:BD56B6E76A92A5925140CB5CC3D940E1DE90993F
                                                                                                                                                                                          SHA-256:6F4F2D7F5BCA4E5183460C0153D2B98F5239A99F149DE6638B311C73CEDB1329
                                                                                                                                                                                          SHA-512:690EC1BCE7FA979BD55725B8ED6DF042BB331CAD332827B2C64B31F107539934AA5A30268B1F03D52697528E68A1BA72E4D56B5199A68B1ED897B75FAFB33A8A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Havana)]} {.. LoadTimeZoneFile America/Havana..}..set TZData(:Cuba) $TZData(:America/Havana)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7440
                                                                                                                                                                                          Entropy (8bit):3.695300167191082
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:CgDIMcVbf+uO7DVopaNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlt:KlfyDjivBeRF+W35Syrwl9h5j
                                                                                                                                                                                          MD5:34339D40AC889DCB5A09D10F123175AD
                                                                                                                                                                                          SHA1:57E1F70FA8999106FA3874A9CE1E75A7ACBC81E9
                                                                                                                                                                                          SHA-256:64E284F9F7A36CC0A352809141D76E73A99344A9F30CFFEA254CBB9D2C589ADA
                                                                                                                                                                                          SHA-512:2DCF16D9D7593FC3E5844E18FD689AADA157866490CFD37A38A47F747DDA189822055F6DD470CA2D77040D2C5A2527512880C22ED8EC16D9424EDF3DC228AFED
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:EET) {.. {-9223372036854775808 7200 0 EET}.. {228877200 10800 1 EEST}.. {243997200 7200 0 EET}.. {260326800 10800 1 EEST}.. {276051600 7200 0 EET}.. {291776400 10800 1 EEST}.. {307501200 7200 0 EET}.. {323830800 10800 1 EEST}.. {338950800 7200 0 EET}.. {354675600 10800 1 EEST}.. {370400400 7200 0 EET}.. {386125200 10800 1 EEST}.. {401850000 7200 0 EET}.. {417574800 10800 1 EEST}.. {433299600 7200 0 EET}.. {449024400 10800 1 EEST}.. {465354000 7200 0 EET}.. {481078800 10800 1 EEST}.. {496803600 7200 0 EET}.. {512528400 10800 1 EEST}.. {528253200 7200 0 EET}.. {543978000 10800 1 EEST}.. {559702800 7200 0 EET}.. {575427600 10800 1 EEST}.. {591152400 7200 0 EET}.. {606877200 10800 1 EEST}.. {622602000 7200 0 EET}.. {638326800 10800 1 EEST}.. {654656400 7200 0 EET}.. {670381200 10800 1 EEST}.. {686106000 7200 0 EET}.. {701830800 10800 1 E
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):111
                                                                                                                                                                                          Entropy (8bit):4.924838898127838
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yLbNMXGm2OHLVva0v:SlSWB9eg/ylDm2OHLVi0v
                                                                                                                                                                                          MD5:B221E7141FFC9DEA317F64F81C7BB4E0
                                                                                                                                                                                          SHA1:B13BBDE790B169D8B9075275523F319D5173E2C7
                                                                                                                                                                                          SHA-256:6344BE02529C1CC5F7B5FE14B7E9BBCED4DDE68A24B824601EEBCAE207ABFDF2
                                                                                                                                                                                          SHA-512:FFFA733476D6C7DCF49C0B88C9F5E381DE2B69BAEDF6C7B1D91C6F45CE2D36E06D40F25B6BB65D4B5D650471BB52CD2EC3F68703DAB4BD5414F8D3F831D92BD2
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:EST) {.. {-9223372036854775808 -18000 0 EST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8505
                                                                                                                                                                                          Entropy (8bit):3.8091719283634853
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:R+kNoStCt/cL1BRP0HY2iU7KKdFL6Aa2K4gSLf8e:RXoSItON0HY2iUmUFLqU
                                                                                                                                                                                          MD5:4578FE48781599B55F4BCF5560019789
                                                                                                                                                                                          SHA1:4EAA7134621DFDEBFD1405F5CC58227FA7E80C3A
                                                                                                                                                                                          SHA-256:0BE6161403BC5A96BFAB174F2C3FCBA8A677D4349699B408E9872B9DD0FE15CE
                                                                                                                                                                                          SHA-512:9ACC2EF396F635D22E3DF6B785831AD74B510049F1BE85F996467A5BBC0DF49A28B2FC3E4CA0CA9DC8FC2C29EA50D909F0B153265B107445D3052E81D9A4D50A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:EST5EDT) {.. {-9223372036854775808 -18000 0 EST}.. {-1633280400 -14400 1 EDT}.. {-1615140000 -18000 0 EST}.. {-1601830800 -14400 1 EDT}.. {-1583690400 -18000 0 EST}.. {-880218000 -14400 1 EWT}.. {-769395600 -14400 1 EPT}.. {-765396000 -18000 0 EST}.. {-84387600 -14400 1 EDT}.. {-68666400 -18000 0 EST}.. {-52938000 -14400 1 EDT}.. {-37216800 -18000 0 EST}.. {-21488400 -14400 1 EDT}.. {-5767200 -18000 0 EST}.. {9961200 -14400 1 EDT}.. {25682400 -18000 0 EST}.. {41410800 -14400 1 EDT}.. {57736800 -18000 0 EST}.. {73465200 -14400 1 EDT}.. {89186400 -18000 0 EST}.. {104914800 -14400 1 EDT}.. {120636000 -18000 0 EST}.. {126687600 -14400 1 EDT}.. {152085600 -18000 0 EST}.. {162370800 -14400 1 EDT}.. {183535200 -18000 0 EST}.. {199263600 -14400 1 EDT}.. {215589600 -18000 0 EST}.. {230713200 -14400 1 EDT}.. {247039200 -18000 0 EST}.. {262767600
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):170
                                                                                                                                                                                          Entropy (8bit):4.862365884559795
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsPHV5XHAIgNGE7TRRL/yCh0DcPHy:SlSWB9vsM3y7fHAIgNTRN/yg0DH
                                                                                                                                                                                          MD5:ACD69F34396296BA553243267D06CEE0
                                                                                                                                                                                          SHA1:9575FFE5E7833B9532F17AC5413EA9DB23F07ECA
                                                                                                                                                                                          SHA-256:936B6484469351DEF8FAFE8EC180862729F5E43BDE4E53E2E9636E221B54C3C2
                                                                                                                                                                                          SHA-512:149D23FF35747127E9A2F4056D09472E8E689970BC795D5411C5BF621D949ADDEBDA68674D375A248A63106ABDFF6C54A8AFE5385C45BE2916CAED0C30F7C4A1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Cairo)]} {.. LoadTimeZoneFile Africa/Cairo..}..set TZData(:Egypt) $TZData(:Africa/Cairo)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):172
                                                                                                                                                                                          Entropy (8bit):4.901791318009318
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV5QH+o3vXHAIgoq6QHFRRL/yMQs/h8QanQHuv:SlSWB9vsM3ymnQeoPHAIgonQzN/yM/hm
                                                                                                                                                                                          MD5:E9C2C97EB65526F1D4BE1AD7385336FA
                                                                                                                                                                                          SHA1:09E4000CE320F779E2DFCA2FFD6B9258FFBA6CE4
                                                                                                                                                                                          SHA-256:B78A833337EFEC8B5F64622F1BFDA21FCB79CF290E9CF32A54B206EB20C6FDE9
                                                                                                                                                                                          SHA-512:EAEC097B58BF466CC7D6C0C6297628AF910CC308AC822565FD6CDABF96CD4EC57D4CC724FE782B6C1B606DFF9424013F6A890A871339577F7CB68BBB3C425E65
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Dublin)]} {.. LoadTimeZoneFile Europe/Dublin..}..set TZData(:Eire) $TZData(:Europe/Dublin)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):110
                                                                                                                                                                                          Entropy (8bit):4.928744204623185
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDMbNMXGm2OHvDwy:SlSWB9eg/yRQJDm2OHsy
                                                                                                                                                                                          MD5:9C08898081382F52CE681B592B8E2C8D
                                                                                                                                                                                          SHA1:165944424740B1FA9B4B3B8E622198ABD0BDA0F8
                                                                                                                                                                                          SHA-256:66B0DF8888883BFF44B18728B48CDF24AAED0BB745D601F3422C4F2D4063E0AC
                                                                                                                                                                                          SHA-512:86EA639F999169F2FBA2457BE5042463A1938031268CCA71FDD03CCBC6194932937BA58B49FBED461E055E9AA668FF6EBF391AA7EC603C0A425416DF2E6CC84D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT) {.. {-9223372036854775808 0 0 GMT}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):159
                                                                                                                                                                                          Entropy (8bit):4.910789466104329
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/yRDOm7/8RDMovn:SlSWB9vsM3yFXHAIgnvVHN/yRSw8RQy
                                                                                                                                                                                          MD5:333F2BFA92742A49BB88F11C7CD896A9
                                                                                                                                                                                          SHA1:BB5BEC010C36427AEEBDDA2FB72083E22A3F5073
                                                                                                                                                                                          SHA-256:64466EA3759301E88C29AD1A833CDCBBC495EB4A5A3AC45E7B2987FECD6702BD
                                                                                                                                                                                          SHA-512:E2270F4B57C5F1C849726259B886E8644DCF497FA0D034AD48885146BEDC70DC8899900DA9AC01F2609A2DA881E10F9042CCBF75A3F5DA7344D7E92F1B070806
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:Etc/GMT+0) $TZData(:Etc/GMT)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):116
                                                                                                                                                                                          Entropy (8bit):4.980500771169276
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDOveyXMXGm2OH1VOwVn:SlSWB9eg/yRSvPDm2OH1VOwV
                                                                                                                                                                                          MD5:A7C3FD06D1E06F125813C9687C42067C
                                                                                                                                                                                          SHA1:515622C0B63E977AFBFC78AD8466053C4A4A71A6
                                                                                                                                                                                          SHA-256:3BE1EC71D2CC88FA9A3DB7DC0476475F33FE5BCBE6BC35C0F083859766466C32
                                                                                                                                                                                          SHA-512:548DA608CFCA5B8539652F94CA2040D624602D2DF64B2C8CCDB8B219B9B384E01386CDF95F3BF77409DF0584FA12A3B73D56D13107D98BEB4C2555F458B3F374
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+1) {.. {-9223372036854775808 -3600 0 -01}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):118
                                                                                                                                                                                          Entropy (8bit):4.965033464829338
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDOPFNMXGm2OH1VYU7vV:SlSWB9eg/yRSPXDm2OH1VYW9
                                                                                                                                                                                          MD5:FF71149E56D4CB553D0ED949B5F4C122
                                                                                                                                                                                          SHA1:3459B47E0EEC80D7A29512CA4F3F236C89E86573
                                                                                                                                                                                          SHA-256:E61E826E6FBC2396EF152640698098F4477D4FFDFE5F791F62250C3EC5865304
                                                                                                                                                                                          SHA-512:43B0CC8BD7F1EFC80C3F14F115D651EADD5743B17B854C2FB7AC25995138D3DF8792915C2952B80F35784A7115F8FB335ACE171479B24C668190AC175523DB21
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+10) {.. {-9223372036854775808 -36000 0 -10}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):118
                                                                                                                                                                                          Entropy (8bit):5.002239901486653
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDOeJMXGm2OHaBByVn:SlSWB9eg/yRSsDm2OHa7yV
                                                                                                                                                                                          MD5:08AABA917A8D6B3BB3D0DD1637F5ABFC
                                                                                                                                                                                          SHA1:D1D704F0250D4CBD450922A02D021E0000FBF5CF
                                                                                                                                                                                          SHA-256:143528946275DDC8B894218D3F1BE56C950F740828CEC13166C3D7E8E1B6BB7E
                                                                                                                                                                                          SHA-512:F37AE54864A613C830308CB94AB7CEA9534A86A53B52B4A2C28CEEFE6F5BC0518143AAFD77A6DA5EC55D392F5BD34FCD4B5BE51794B1A386ED783B9BA89C10C3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+11) {.. {-9223372036854775808 -39600 0 -11}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):118
                                                                                                                                                                                          Entropy (8bit):4.97889339723103
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDONdNMXGm2OH3FNyUFFv:SlSWB9eg/yRSNDm2OH3XyMv
                                                                                                                                                                                          MD5:7374B66D6E883D7581E9561C3815EB92
                                                                                                                                                                                          SHA1:235E96A7420DF6733F3CA368D4A2D57766656043
                                                                                                                                                                                          SHA-256:A93EAFAC2C1089C608C8536127D0E8B53D8C7CFD13AE7DD69339E12A89F803C6
                                                                                                                                                                                          SHA-512:9BA59B17F20D65DFF1A5A2D557B535F69B04C172AECB15F88CA3484D74CC7D53894985C08653CF13D868BCBD5E7E5041E0CB2F457B5B603F3851198E552E33A7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+12) {.. {-9223372036854775808 -43200 0 -12}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):116
                                                                                                                                                                                          Entropy (8bit):4.922268982357521
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDOcF3vFNMXGm2OHnFQVIyV:SlSWB9eg/yRS0fXDm2OHnFQVb
                                                                                                                                                                                          MD5:FDDC663E40F8FFFE27959E94625725DF
                                                                                                                                                                                          SHA1:EE3FBC1F6C8BBCF1BDC9E5DB4D2EA1A57E2E9BB3
                                                                                                                                                                                          SHA-256:AD5833153446960BDE0653A22AE2111BF80CFD61C3010993CE87B81D40C75C72
                                                                                                                                                                                          SHA-512:A1B2A153834FEAD7DC27C0918E1B1CB905671F82850C1CAAEBD89F5535703FB259F02F699EA7F82F3044E37668EE93DFA4D4EB862CD437AFF0DABA84867B1963
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+2) {.. {-9223372036854775808 -7200 0 -02}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):117
                                                                                                                                                                                          Entropy (8bit):4.949132511023475
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDOFfMXGm2OHBFVGAvFv:SlSWB9eg/yRSlDm2OHBFAKV
                                                                                                                                                                                          MD5:5C6F16F2CFD46030688066F9BFBE675D
                                                                                                                                                                                          SHA1:1DB5F36584822EB92E75B9AC9F440FD671BD90AE
                                                                                                                                                                                          SHA-256:C7BEE4C71905EDDB40BAF42C0CD0DC70BB9F298EAAB8B9367D484B8431DD084A
                                                                                                                                                                                          SHA-512:FFB2C4CD8EA7DE165C3D989454898FF2023D1A1E3B2B34EC23B1B71EFA7BF2538488DA0069E59F1152B8933D2263B762D2D7C56ADBED826C33FC0BA6672E34DB
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+3) {.. {-9223372036854775808 -10800 0 -03}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):117
                                                                                                                                                                                          Entropy (8bit):4.971627677226461
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDOqJMXGm2OHBvGQy:SlSWB9eg/yRSQDm2OHBON
                                                                                                                                                                                          MD5:E35244C1A6084C7BC1D79E437677C55C
                                                                                                                                                                                          SHA1:898619DA4B8B9AC72E69C7BD30DEA2ADEF9440FE
                                                                                                                                                                                          SHA-256:26D1EF512CC5797FC63BA2B83C7D6271025F4D4F5C904D9FA8E97F053393D9A7
                                                                                                                                                                                          SHA-512:0687758558C4C5FF7802F3A57212694A1515761A8337D4B75FFE81434D2AD8A221B005DEC36BF013F2FC3DE1E46DFBED36352811EB7C5A5AE3A167A2E314F57C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+4) {.. {-9223372036854775808 -14400 0 -04}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):117
                                                                                                                                                                                          Entropy (8bit):4.956438091983076
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDOJNMXGm2OHLVvyV6Aov:SlSWB9eg/yRSDDm2OHLVKVg
                                                                                                                                                                                          MD5:7C560A0F3C42E399AC1247CB6C516DC6
                                                                                                                                                                                          SHA1:C314B09D4E369C69C23A8DC1FB066FD0CFDC7211
                                                                                                                                                                                          SHA-256:054910BDDFC44D9B806BBD3008C30547FA57ECD3C043418C406A725158144688
                                                                                                                                                                                          SHA-512:FCE8431B759BD5359847734FD98D9D91394916235B2AF587FC927D5F3196FB283E241A6A9200EA852F9265ECEF81402FF6ACD0FA3A4AAEF6DF9DB1B056B3A9EF
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+5) {.. {-9223372036854775808 -18000 0 -05}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):117
                                                                                                                                                                                          Entropy (8bit):4.974743300958087
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDOAkSMXGm2OHvTmULyn:SlSWB9eg/yRSbSDm2OHviX
                                                                                                                                                                                          MD5:EEB1A3E0FD3339E332587D19C116D4EF
                                                                                                                                                                                          SHA1:5DBF046031CD354B1EF88E46D3FED74706D21AC6
                                                                                                                                                                                          SHA-256:D53BB247E0E429A6243AB9A9BDCAE1EE1CF5F271D79748A843631906AB63A988
                                                                                                                                                                                          SHA-512:07BDF9056DC335C773684E634B1D389FBD139464D4597DE862B7EAC096676A093934682BF911F4E68F299789931218C0E431F0CC6BEBD7275B5FC8015EDD0942
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+6) {.. {-9223372036854775808 -21600 0 -06}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):117
                                                                                                                                                                                          Entropy (8bit):4.930134062078826
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDONeyFNMXGm2OHrXVYVny:SlSWB9eg/yRSNPDm2OHriVy
                                                                                                                                                                                          MD5:F92B31548D6BF8CCFA326C0CA6E205A0
                                                                                                                                                                                          SHA1:3FFC6C214EDBCBE9C2509306CE73B429113E1C8A
                                                                                                                                                                                          SHA-256:6BA5779E35D581B409F53B14B6E28ECC16F536FFEDD45DDBC8DAE4B8C28F66E7
                                                                                                                                                                                          SHA-512:317872E986099D02AF083397AE936854043D54CEBF45A70672F02DDC9E2F3B27BC3FA80902F9675131C51A09BBD3C2BD1CD437330935CEA113C643769E0DF20C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+7) {.. {-9223372036854775808 -25200 0 -07}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):117
                                                                                                                                                                                          Entropy (8bit):4.915798027862021
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDOOF3vXMXGm2OHmFvGpn:SlSWB9eg/yRSqfXDm2OHaOp
                                                                                                                                                                                          MD5:B31B15E6006F8DF0D7627D6C90FF39AF
                                                                                                                                                                                          SHA1:7C4137BE11DA84771DF6DC5EBC32D5E5E87E060F
                                                                                                                                                                                          SHA-256:CA87559B154B165E83482AEE3D753BA8E38ABCA347A005E8504C566433CF4CB3
                                                                                                                                                                                          SHA-512:220F7E7379EABBC8ACD7ADBB7A4AC8E93E4B268F8F1C0965B7E6A09735EE86E293EF1C492990331EEB4176B8301A91EC20579756B962AE45C858A96C09349CCD
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+8) {.. {-9223372036854775808 -28800 0 -08}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):117
                                                                                                                                                                                          Entropy (8bit):4.95764928386407
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDO3fMXGm2OHNms:SlSWB9eg/yRSPDm2OHNms
                                                                                                                                                                                          MD5:5B10173EB7119F1219250763504A3526
                                                                                                                                                                                          SHA1:A845021437C4638079040EF27AEF163C865FF8F8
                                                                                                                                                                                          SHA-256:A0987A1D078B0993FB3B07208E3F4538A2319DCDDDEB2FAEA32FC463DEAFB8DB
                                                                                                                                                                                          SHA-512:D213285D0A723B7771263122AFA269C2ABD0325A97D32C3870341255C06597DD6851C22860CFF42BF54E3FF5A36FC88C306F3BF1C69E7BD7FD7F69FE7601ED1A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT+9) {.. {-9223372036854775808 -32400 0 -09}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):159
                                                                                                                                                                                          Entropy (8bit):4.898210849752128
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/yRDIyHp8RDMovn:SlSWB9vsM3yFXHAIgnvVHN/yRUyJ8RQy
                                                                                                                                                                                          MD5:5AFB7F12BA056619252D48904523DFA9
                                                                                                                                                                                          SHA1:CD6E6681C8302BF38095975DF556BD14959FDAC8
                                                                                                                                                                                          SHA-256:EFF27B3DEE9306641FF344801E06BB33FF768CDCCFE2409FA8AF752FF6D39F66
                                                                                                                                                                                          SHA-512:2869BB347F42667A3D174816466B15916FC61FCB5A6A1BE1DD750C5C1751602FEE0FE5A27651B7A19C9F6764872DD0F00D3D5AA16CA1A743DBA09646D25A4EB2
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:Etc/GMT-0) $TZData(:Etc/GMT)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):115
                                                                                                                                                                                          Entropy (8bit):4.979902281541545
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDI/fMXGm2OHMKUrn:SlSWB9eg/yRUXDm2OHtUr
                                                                                                                                                                                          MD5:4000096844091488200125FC8F50E2F5
                                                                                                                                                                                          SHA1:9FFEAE66405CFB254180C7DBE185288791DFEE5F
                                                                                                                                                                                          SHA-256:B4BF883FBE9246EF4079179A746B1F9E59F2C77D4F598794B60732D198DC6044
                                                                                                                                                                                          SHA-512:25C69E04018C2978A2E5748F0D3C61157453D998C16FA4B3C257A6515B87F5FD2B754893B47604BBC60AB60B60BA162BF2D1463E616E72CB8713C736F1B4D428
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-1) {.. {-9223372036854775808 3600 0 +01}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):117
                                                                                                                                                                                          Entropy (8bit):4.964101313797091
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDINFeyFNMXGm2OHMUUMy:SlSWB9eg/yRUN5XDm2OHXFy
                                                                                                                                                                                          MD5:AE6601FACF6BE1E68083F8D353901181
                                                                                                                                                                                          SHA1:8B3BFA307D2A94BADD3A1A5E42545D6F7C620BCE
                                                                                                                                                                                          SHA-256:EF3046D7789CAE069B5473D053F3EF0157248F8A359A1282EE02BA613A75FC94
                                                                                                                                                                                          SHA-512:1859E6A2CB94EFEE7CD5C17803AA4F2DEEBE4DCF43D3B1EA737DF00BA86ECEC79D296D75E69D5829DECB48380B6B650724104FFA7959FD18FE032DF7D002A88B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-10) {.. {-9223372036854775808 36000 0 +10}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):117
                                                                                                                                                                                          Entropy (8bit):5.00162575418652
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDIVSMXGm2OHlVVtyn:SlSWB9eg/yRUVSDm2OHlVLy
                                                                                                                                                                                          MD5:D864BA451C9E441BF47D233626C57B99
                                                                                                                                                                                          SHA1:6C38E6F8BA292575C496124572D187F97C9F8E73
                                                                                                                                                                                          SHA-256:CCDEADBD18BE81E59A669A460A14AFCBFF733C3A5D164FC2B6B93DEAF009B78A
                                                                                                                                                                                          SHA-512:5C16BD1189F3FE6789CB3630C841FD168EC87D0498EE6FCC4C8D635F8CF4BCAF0558B44F859C37E418F6BC5A7F6693D6EF1DD218A1DB6DA2D54FF55916685119
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-11) {.. {-9223372036854775808 39600 0 +11}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):117
                                                                                                                                                                                          Entropy (8bit):4.978079707159482
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDIjbNMXGm2OHwvv0UIoAov:SlSWB9eg/yRUjJDm2OHwvv0YAov
                                                                                                                                                                                          MD5:C3E7748C7CB9D8A7F7FA5170D5098983
                                                                                                                                                                                          SHA1:54F5374A32173BEC6EDA430745DCD18749ABC233
                                                                                                                                                                                          SHA-256:23B61B18C653E25F7245B0BB6E04AD347E038585B145962FD1EEACE26F118D54
                                                                                                                                                                                          SHA-512:4783A7CD4C94CCC67C1C71F9C5D9CD99A3918EA4792D8CE2443ACE8F034B9023EBC02405B5DEAB919AA35FD1FD29D8980774316AC96D32ECDEBEFA15BBE6878D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-12) {.. {-9223372036854775808 43200 0 +12}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):117
                                                                                                                                                                                          Entropy (8bit):4.994320173226919
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDIaMXGm2OH1dNv7Dy:SlSWB9eg/yRUaDm2OHty
                                                                                                                                                                                          MD5:224AAAA8A31C283F50149A090E3970D5
                                                                                                                                                                                          SHA1:E7E4876EC2474FEFD82D4B174CA8E3A3427062F5
                                                                                                                                                                                          SHA-256:A9F1AD5A7CB5ED43C5E6E8A7A9B887329890ABB75B9FC9483B8543A367457EBE
                                                                                                                                                                                          SHA-512:6EE0C6F519AAB2DAA3F7D802F0F838BA9F6BF1D56530000D3C9EA4FDA81DCB9832A3285E36208F29EEB23C27EC5BFD3438DC272929A7531268B7C0626A65D6A5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-13) {.. {-9223372036854775808 46800 0 +13}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):117
                                                                                                                                                                                          Entropy (8bit):4.9895752453470585
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDIxhfMXGm2OH0FVtXvFv:SlSWB9eg/yRUxJDm2OH8jNv
                                                                                                                                                                                          MD5:8ADF71739DCADE63433B7BF8321EAC77
                                                                                                                                                                                          SHA1:AA6BDE83FF0D8BCFDE0426160250F2D17D3AF81D
                                                                                                                                                                                          SHA-256:A37A7160027BD38356764C4D1AA5B9B17F8D5DC3CFB81EF2ED399E44C41734CE
                                                                                                                                                                                          SHA-512:AEE3929DE269ADB5265A54841F041E41595359C101539F6309A4E737E3F5DF0BC91560781C7118975398C29A084113682C78F66E07E2E4AC5EAC8DFC33C4F0ED
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-14) {.. {-9223372036854775808 50400 0 +14}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):115
                                                                                                                                                                                          Entropy (8bit):4.921164129348819
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDInWNMXGm2OH/VXF9:SlSWB9eg/yRUnSDm2OH/Vb
                                                                                                                                                                                          MD5:CABB864F4E76B90928F5C54CD9334DEB
                                                                                                                                                                                          SHA1:4818D47F83F16B9F7612D1E979B2440C170ECDB9
                                                                                                                                                                                          SHA-256:7211BF8329B2388563ED8FA8C5140099A171B8A303A9473E9A6F3AF0C5D239CB
                                                                                                                                                                                          SHA-512:1FDCB05D675F1D28CB52B9F5EAC7EC52FDF2CE7E7411740A6F8FB5E9D443ED636CE268E3AF9E08605CC3E13A49B2D86FF4EA6A85F518D5C79E263BA94263361D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-2) {.. {-9223372036854775808 7200 0 +02}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):116
                                                                                                                                                                                          Entropy (8bit):4.948161547682094
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDIYyXMXGm2OHkNsWYcv:SlSWB9eg/yRUlDm2OHkKWYe
                                                                                                                                                                                          MD5:4AE5F29A13A86E4A7064E9200668E43B
                                                                                                                                                                                          SHA1:2460BD1BB0FF3A3C774A5C7CC3DA10235DA06B0D
                                                                                                                                                                                          SHA-256:BFC86D65B0B94725DCE4C88EDC4300141ABBCA4B6CDECF037C437DF49F0C1D6A
                                                                                                                                                                                          SHA-512:190DC38B4A20F964C967866507086317D85D979DFCFA415D1569C485C6476024922BC6E7103273C41889D9D7B22E97933F286FCF4D341248077C1BA777D0EE3B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-3) {.. {-9223372036854775808 10800 0 +03}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):116
                                                                                                                                                                                          Entropy (8bit):4.970850637731657
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDIQXMXGm2OHkVsRYovV:SlSWB9eg/yRUQXDm2OHkSN
                                                                                                                                                                                          MD5:BBAF760E27C02D176A675AC3CF2D1E6D
                                                                                                                                                                                          SHA1:E524FAA7D424A1C1545D1D8EC00169125A68E8E5
                                                                                                                                                                                          SHA-256:02E2EEAF88EE179EF63DD29ACC7384A4B46DE1E3A151C1F3A5DD31BBB5A05AEE
                                                                                                                                                                                          SHA-512:6AC7CC0E52E7793C7F2D3DDA9551709DEAE654C1182EAD7108D04F1BAAAB7E1C473B6E8A3A126B0E421D8A246294A03B2EE9E070330924502DF2869CC61C37F7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-4) {.. {-9223372036854775808 14400 0 +04}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):116
                                                                                                                                                                                          Entropy (8bit):4.955530107787899
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDI7tNMXGm2OHM0VQVFv:SlSWB9eg/yRU7PDm2OHnVQVV
                                                                                                                                                                                          MD5:17F64A5969D3755211E60C0A9F83974F
                                                                                                                                                                                          SHA1:FEFA84725EFAE6405F43797296C342B974F2D272
                                                                                                                                                                                          SHA-256:3A2C75DCA11D1167126F0D44A8682420FAF75B0B82B3DCFC35A9F028A9A759E8
                                                                                                                                                                                          SHA-512:77DBCD8284A470E4869976E2E8A5EDE28104283F120C863785A6B2E64CF87E06243196817C0055A9B32D6FFFE94A25772F67D58BF8E885F7EC06C34FABE38766
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-5) {.. {-9223372036854775808 18000 0 +05}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):116
                                                                                                                                                                                          Entropy (8bit):4.973993120288556
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDIg3fMXGm2OHETNSTVVn:SlSWB9eg/yRUgPDm2OHETMX
                                                                                                                                                                                          MD5:51CAF7956E133C8A9788AE0B8C6145AB
                                                                                                                                                                                          SHA1:47F8B49DF9ED477BD95F908693A483AE4FDE881F
                                                                                                                                                                                          SHA-256:D22C87321373EC0EFB0F312925476CD0747323EF303E17621A871BF814C8ABB1
                                                                                                                                                                                          SHA-512:EC4B4BE74C1BA64DEC8EF11DAAA338C52BD67D55E8A2352FBC6C83FA142F8DBE424CC1110E9A9D9A891E1E858D1FFA6D1E3B997D41BBB374556FA1F9A708559E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-6) {.. {-9223372036854775808 21600 0 +06}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):116
                                                                                                                                                                                          Entropy (8bit):4.928999319005163
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDIpdNMXGm2OHAXUVSYovV:SlSWB9eg/yRURDm2OHAXUVSYyV
                                                                                                                                                                                          MD5:56D88B54CA33B43E2E7D3EA6AD3A4D6E
                                                                                                                                                                                          SHA1:9351E0C001C5D83325281AF54363D76D65548B7D
                                                                                                                                                                                          SHA-256:70CB3A766A2E84148B68613D68687D263D3592ED4B6E672797FB20801ECA8231
                                                                                                                                                                                          SHA-512:32B58AD16F64590903C7AB49BA4890DAF6F1F3D33187A7654D3DA88A1C0047483EAA58B2498D824A30116E235FCC8F8FB3FADD57F86396240E5D92B2CA337027
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-7) {.. {-9223372036854775808 25200 0 +07}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):116
                                                                                                                                                                                          Entropy (8bit):4.9145396982864895
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDIlSMXGm2OHN/VsdYLyn:SlSWB9eg/yRUlSDm2OHUp
                                                                                                                                                                                          MD5:E462AD5E0C046EA6769EDB4B2C80F4D4
                                                                                                                                                                                          SHA1:6DDB94485648622875E0927BA1E8CFE67CEC1382
                                                                                                                                                                                          SHA-256:80C85D59416CEC91DB3DAC5FDD2FD7B91D6FC74A37BBBEF6FF58F6F6816E8FC9
                                                                                                                                                                                          SHA-512:42734FD2DA8BD6E0BC271FF1375A31DEB72EED85AB5EA6E1E0F81EE4E3E7E74380FFC98FAC30409684F736DB580AAAF4F62DB4757AA35C10383584F6144EF363
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-8) {.. {-9223372036854775808 28800 0 +08}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):116
                                                                                                                                                                                          Entropy (8bit):4.956751740978211
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRDIeyXMXGm2OHENScFAy:SlSWB9eg/yRUPDm2OHsScr
                                                                                                                                                                                          MD5:98F70EC1B1AC7D38CB8D01705FB0CA56
                                                                                                                                                                                          SHA1:EDAFA132E48935ACEB8E72D3FF463E4FC857C1A9
                                                                                                                                                                                          SHA-256:57395BB968AFA5A041EADA4B684B82F0379A9333F9522D69F069A79FDEA2B8D7
                                                                                                                                                                                          SHA-512:97B8D7603D6B54C075B005B905B2A7A28B8BEA67894F055663C44D2BF730BB937AC8EF5B2DF182BDD2D9EFFDBD135DF9467C813AEE39AA6B34256908A12DC011
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/GMT-9) {.. {-9223372036854775808 32400 0 +09}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):158
                                                                                                                                                                                          Entropy (8bit):4.886484135647838
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/yRDVMFHp8RDMovn:SlSWB9vsM3yFXHAIgnvVHN/yRC1p8RQy
                                                                                                                                                                                          MD5:F879FB24EA976394B8F4FAF1A9BF268C
                                                                                                                                                                                          SHA1:903714237EBD395A27EAF00B3DAAA89131267EE5
                                                                                                                                                                                          SHA-256:AB742F93BE44BD68AB8FE84505FA28120F1808765D9BAED32A3490AF7C83D35B
                                                                                                                                                                                          SHA-512:F5EE4C331E37036516F2A1BF12F2E088B2E2C7F6475127BF4E7B4937F864550D64D570BC855B6058D4311755E8696EC42095A36AEF13BB29E62192EE0AFB6EAF
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:Etc/GMT0) $TZData(:Etc/GMT)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):163
                                                                                                                                                                                          Entropy (8bit):4.911342539638601
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/yRp+FB5yRDMovn:SlSWB9vsM3yFXHAIgnvVHN/yRp6BURQy
                                                                                                                                                                                          MD5:CDD2DE9CF0FECFEA0CDD32DAC32DCDE2
                                                                                                                                                                                          SHA1:311CD4C6E819E18BAAACC382F81359BC208E2F73
                                                                                                                                                                                          SHA-256:F89167B6117838D9679C0397496B6D96D3A7BEAEF0BD99406ABACDBDB658FBCC
                                                                                                                                                                                          SHA-512:1AF061D07D2F579A089905B6B259AABD7C58F4FA0CD379EE54206164F0DCAEA5C720FB1F5E76F5782F8613E62D8F83BD55F1848D5D7A73D4A5C9F7BC6B9F5DB1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:Etc/Greenwich) $TZData(:Etc/GMT)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):157
                                                                                                                                                                                          Entropy (8bit):4.838936002050477
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqAxmS3vXHAIgELyHRL/yRKh8RFB:SlSWB9vsM3yzTHAIgm6N/yR68RX
                                                                                                                                                                                          MD5:0587EB7D1B1C684A4A0F90D3CB0959C8
                                                                                                                                                                                          SHA1:3F2840AE512774494D9A0B6357C52CCB7DBA5265
                                                                                                                                                                                          SHA-256:0856D14DBBC53D46460BCD530BD070E9E8966D1C96BA01BA556E215A98C09CD4
                                                                                                                                                                                          SHA-512:DE38EF28893853219AC24AE4A522307ADAA1502F6D0C129219FAD9D75CFCE03A505C3E0758CFF2D2D4F7101414A5F7E4FC1C1B119B667E6A9C89B60DDA641E86
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/UTC)]} {.. LoadTimeZoneFile Etc/UTC..}..set TZData(:Etc/UCT) $TZData(:Etc/UTC)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):110
                                                                                                                                                                                          Entropy (8bit):4.903699772785336
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/yRF3yFNMXGm2OHvL:SlSWB9eg/yR9SDm2OHj
                                                                                                                                                                                          MD5:3D3F94B6AC5FA232E509356C703D9177
                                                                                                                                                                                          SHA1:502B8EE9D4A1EA75A91272181AC87B9B6ECE1F84
                                                                                                                                                                                          SHA-256:4D74D9EC2397B1708FEF47806294B0BCA26679F3A63149AE24E4E0C641976970
                                                                                                                                                                                          SHA-512:205A761A01C577F602236CB5C9938C834B7F3F9F681B94036B0A86101119893EF87D206D0C3F7737075ED833D4E35E374ACAE6605163E9C37B705D99BEBC928C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Etc/UTC) {.. {-9223372036854775808 0 0 UTC}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):163
                                                                                                                                                                                          Entropy (8bit):4.874807282103623
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqAxmS3vXHAIgELyHRL/yRYzXDJMFfh8RFB:SlSWB9vsM3yzTHAIgm6N/yRY7VMr8RX
                                                                                                                                                                                          MD5:65E28EFF342B625E79175793FD38F9FD
                                                                                                                                                                                          SHA1:08B11474822E670DEAB8F0EA168BAED7D5E3DBE1
                                                                                                                                                                                          SHA-256:A2B62C5914DE169A68A018A5B47C1253DBCA10A251862D17B0781ECFD19B6192
                                                                                                                                                                                          SHA-512:79641D0E05F81BFB80034937D34E74B7483A790F33C1F9A0FA92C6A7913AC8C03036CFDEFB43850B84EFB3DD3C4A39022DC8F22E5B5DE6353586A546E03A5789
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/UTC)]} {.. LoadTimeZoneFile Etc/UTC..}..set TZData(:Etc/Universal) $TZData(:Etc/UTC)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):158
                                                                                                                                                                                          Entropy (8bit):4.874356623237119
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqAxmS3vXHAIgELyHRL/yRaQEBURFB:SlSWB9vsM3yzTHAIgm6N/yRYaRX
                                                                                                                                                                                          MD5:EDABCAC858EC9632D5D8DCCFB28F4D6E
                                                                                                                                                                                          SHA1:E5BEF1367A97A1900749CE6B1E01CF32F582BDD9
                                                                                                                                                                                          SHA-256:BBD6E93206FF3B7017AFBE63905B4C932C422B582F3CE2A79A7B885D390EE555
                                                                                                                                                                                          SHA-512:3A22364D423F2F970123561408018A2B72F43C4978836D3B6DF7517217445605838DCB8DDBDA204FD01C49A4A7D5ADAD4CA8BDA7C3B412D54750BAEAA589B683
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/UTC)]} {.. LoadTimeZoneFile Etc/UTC..}..set TZData(:Etc/Zulu) $TZData(:Etc/UTC)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):9102
                                                                                                                                                                                          Entropy (8bit):3.899679308991091
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:UvV6eHuZ+y+2KDBb0S274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOn:SVJUSs41sFpM5vwA6Efv03TBZLl
                                                                                                                                                                                          MD5:262A99D2D471F855C2A3C96CACB0C431
                                                                                                                                                                                          SHA1:2CAC8BFAD1A626A189413203ADA2E2B753A6DA69
                                                                                                                                                                                          SHA-256:5808F77CAB37ED4F52F0A02FF0B75EA194F8799A2165695CA3650579CAD498D9
                                                                                                                                                                                          SHA-512:6DC3BD4177292C07390CD0EC2F672FB6846CEEFA1A2C57B2C8E84CE43C90486544350DA998A5E36CA7A02C46859B4183D829B26013E01071014C6E2849D6573C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Amsterdam) {.. {-9223372036854775808 1172 0 LMT}.. {-4260212372 1172 0 AMT}.. {-1693700372 4772 1 NST}.. {-1680484772 1172 0 AMT}.. {-1663453172 4772 1 NST}.. {-1650147572 1172 0 AMT}.. {-1633213172 4772 1 NST}.. {-1617488372 1172 0 AMT}.. {-1601158772 4772 1 NST}.. {-1586038772 1172 0 AMT}.. {-1569709172 4772 1 NST}.. {-1554589172 1172 0 AMT}.. {-1538259572 4772 1 NST}.. {-1523139572 1172 0 AMT}.. {-1507501172 4772 1 NST}.. {-1490566772 1172 0 AMT}.. {-1470176372 4772 1 NST}.. {-1459117172 1172 0 AMT}.. {-1443997172 4772 1 NST}.. {-1427667572 1172 0 AMT}.. {-1406672372 4772 1 NST}.. {-1396217972 1172 0 AMT}.. {-1376950772 4772 1 NST}.. {-1364768372 1172 0 AMT}.. {-1345414772 4772 1 NST}.. {-1333318772 1172 0 AMT}.. {-1313792372 4772 1 NST}.. {-1301264372 1172 0 AMT}.. {-1282256372 4772 1 NST}.. {-1269814772 1172 0 AMT}.. {-12507
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):6927
                                                                                                                                                                                          Entropy (8bit):3.8182041031531897
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:CA34elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxOrnW+:CI41sFpM5vwA6Efv03TBZLl
                                                                                                                                                                                          MD5:D897DCA686A03495EB2C3323FAB0BEAD
                                                                                                                                                                                          SHA1:1433BC303DE92F7B36F881C8595A42B35E0814FC
                                                                                                                                                                                          SHA-256:F0B48DA7CA3659450D87CC0DDFDDFD28B464543DF1EE40D935C44D5CD7C9B9B3
                                                                                                                                                                                          SHA-512:A1C4AE1E0EC26B159B0F5D058A7A77B8774F611A4D3C6AECEDD7186957D6BD9F15CDFCBA248FCC8A4B4146BD72CD7D66B9F88A2BF7CDEF416F1831A2F335D48C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Andorra) {.. {-9223372036854775808 364 0 LMT}.. {-2177453164 0 0 WET}.. {-733881600 3600 0 CET}.. {481078800 7200 0 CEST}.. {496803600 3600 0 CET}.. {512528400 7200 1 CEST}.. {528253200 3600 0 CET}.. {543978000 7200 1 CEST}.. {559702800 3600 0 CET}.. {575427600 7200 1 CEST}.. {591152400 3600 0 CET}.. {606877200 7200 1 CEST}.. {622602000 3600 0 CET}.. {638326800 7200 1 CEST}.. {654656400 3600 0 CET}.. {670381200 7200 1 CEST}.. {686106000 3600 0 CET}.. {701830800 7200 1 CEST}.. {717555600 3600 0 CET}.. {733280400 7200 1 CEST}.. {749005200 3600 0 CET}.. {764730000 7200 1 CEST}.. {780454800 3600 0 CET}.. {796179600 7200 1 CEST}.. {811904400 3600 0 CET}.. {828234000 7200 1 CEST}.. {846378000 3600 0 CET}.. {859683600 7200 1 CEST}.. {877827600 3600 0 CET}.. {891133200 7200 1 CEST}.. {909277200 3600 0 CET}.. {922582800 7200 1 CEST}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2063
                                                                                                                                                                                          Entropy (8bit):3.679377249443024
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:TvCAs6kKR6aQmF1cSNWrI+AjXgV/Ap40FjDOP:rCAs6kC6aZF1cSN4I+AjXgV/ApDFjDM
                                                                                                                                                                                          MD5:CB860328FA96A14055BF51A3B2D35A08
                                                                                                                                                                                          SHA1:CFA49DC861F4AC3D29A78D63D71C2D6D83D68F84
                                                                                                                                                                                          SHA-256:4B5FB0AF225974D117374028285F20A02B833FF4136E6BFAE7B65E6D6D28829E
                                                                                                                                                                                          SHA-512:960152826F4245012462E53F80B69B0C45C27D75D46C70D485674CA19071DF268671C7691B614BE53B9E7BD8CFEC5D24F3DCF933F2F14D827F2A32EB347D7540
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Astrakhan) {.. {-9223372036854775808 11532 0 LMT}.. {-1441249932 10800 0 +03}.. {-1247540400 14400 0 +05}.. {354916800 18000 1 +05}.. {370724400 14400 0 +04}.. {386452800 18000 1 +05}.. {402260400 14400 0 +04}.. {417988800 18000 1 +05}.. {433796400 14400 0 +04}.. {449611200 18000 1 +05}.. {465343200 14400 0 +04}.. {481068000 18000 1 +05}.. {496792800 14400 0 +04}.. {512517600 18000 1 +05}.. {528242400 14400 0 +04}.. {543967200 18000 1 +05}.. {559692000 14400 0 +04}.. {575416800 18000 1 +05}.. {591141600 14400 0 +04}.. {606866400 10800 0 +04}.. {606870000 14400 1 +04}.. {622594800 10800 0 +03}.. {638319600 14400 1 +04}.. {654649200 10800 0 +03}.. {670374000 14400 0 +04}.. {701820000 10800 0 +04}.. {701823600 14400 1 +04}.. {717548400 10800 0 +03}.. {733273200 14400 1 +04}.. {748998000 10800 0 +03}.. {764722800 14400 1 +04}.. {7
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7954
                                                                                                                                                                                          Entropy (8bit):3.7252594544513795
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:1D/8QdzFu+f+uO7DVopaNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYf:Z/8ohvyDjivBeRF+W35Syrwl9h5j
                                                                                                                                                                                          MD5:8B2C99E1CD04D7559709FDF8D382343C
                                                                                                                                                                                          SHA1:C595D5159C742B815AF89EC8604376E01291F9F1
                                                                                                                                                                                          SHA-256:47353319419505AAB205C23F8C97EA0B12E5DED2113147794F77B67349AFF52F
                                                                                                                                                                                          SHA-512:227CA21A3B6160357988582E261A62AE7B09D46D479EABFAC8039185D710EFA765CD1694F4388EBF8800978A1E1DB69F6AF9BB9BF82C0FCD66E883930E1F8249
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Athens) {.. {-9223372036854775808 5692 0 LMT}.. {-2344642492 5692 0 AMT}.. {-1686101632 7200 0 EET}.. {-1182996000 10800 1 EEST}.. {-1178161200 7200 0 EET}.. {-906861600 10800 1 EEST}.. {-904878000 7200 0 CEST}.. {-857257200 3600 0 CET}.. {-844477200 7200 1 CEST}.. {-828237600 3600 0 CET}.. {-812422800 7200 0 EET}.. {-552362400 10800 1 EEST}.. {-541652400 7200 0 EET}.. {166485600 10800 1 EEST}.. {186184800 7200 0 EET}.. {198028800 10800 1 EEST}.. {213753600 7200 0 EET}.. {228873600 10800 1 EEST}.. {244080000 7200 0 EET}.. {260323200 10800 1 EEST}.. {275446800 7200 0 EET}.. {291798000 10800 1 EEST}.. {307407600 7200 0 EET}.. {323388000 10800 1 EEST}.. {338936400 7200 0 EET}.. {347148000 7200 0 EET}.. {354675600 10800 1 EEST}.. {370400400 7200 0 EET}.. {386125200 10800 1 EEST}.. {401850000 7200 0 EET}.. {417574800 10800 1 EEST}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):182
                                                                                                                                                                                          Entropy (8bit):4.876296755647751
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVxKL823vXHAIgoqyKL8H6RL/yQahs3QavKL81n:SlSWB9vsM3ymvKA2PHAIgovKAH6N/y72
                                                                                                                                                                                          MD5:7160C6EE32380846653F016AE8AFD52A
                                                                                                                                                                                          SHA1:DE7805089639C54893F2107FA67342DA72A79BBC
                                                                                                                                                                                          SHA-256:557023674F6E8376707517103EE69C1DEBBE53CDD4BCAB11E763CC53B9CB1908
                                                                                                                                                                                          SHA-512:FDBDECBBDB0C419226E2604608FD2923CFB06E4B6948493208FD83FD796880E81F6147C0FAFEB572079C9C916831B7B055620EC939164CCA1DAF76897BE60F2C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/London)]} {.. LoadTimeZoneFile Europe/London..}..set TZData(:Europe/Belfast) $TZData(:Europe/London)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7309
                                                                                                                                                                                          Entropy (8bit):3.8204712502914653
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:lp+/4elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxOrnW+:lY41sFpM5vwA6Efv03TBZLl
                                                                                                                                                                                          MD5:02A003411B61A311896A6407B622152A
                                                                                                                                                                                          SHA1:3B8BC6D1AF698CE7BB14A08307F5A4295EB8ED03
                                                                                                                                                                                          SHA-256:74B225511B518B0CED972CBB33D694697712CCB96A6D81E0F50ADA28CF6E2C92
                                                                                                                                                                                          SHA-512:9E03B3EB1E528E5B1ADBA09F808E73BF9C4314EDCBF6F96E46844D51A5F425BED3EE8FD5BA8706C46A7FB9882485F119F81996F2EAB7E1E9B598978C402DDE0F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Belgrade) {.. {-9223372036854775808 4920 0 LMT}.. {-2713915320 3600 0 CET}.. {-905824800 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-788922000 3600 0 CET}.. {-777942000 7200 1 CEST}.. {-766623600 3600 0 CET}.. {407199600 3600 0 CET}.. {417574800 7200 1 CEST}.. {433299600 3600 0 CET}.. {449024400 7200 1 CEST}.. {465354000 3600 0 CET}.. {481078800 7200 1 CEST}.. {496803600 3600 0 CET}.. {512528400 7200 1 CEST}.. {528253200 3600 0 CET}.. {543978000 7200 1 CEST}.. {559702800 3600 0 CET}.. {575427600 7200 1 CEST}.. {591152400 3600 0 CET}.. {606877200 7200 1 CEST}.. {622602000 3600 0 CET}.. {638326800 7200 1 CEST}.. {654656400 3600 0 CET}.. {670381200 7200 1 CEST}.. {686106000 3600 0 CET}.. {701830800 7200 1 CEST}.. {717555600 360
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8020
                                                                                                                                                                                          Entropy (8bit):3.820756136386754
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:Pi9+qFR274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxo:PQs41sFpM5vwA6Efv03TBZLl
                                                                                                                                                                                          MD5:84027C3C8315BD479B38DE11F38E873F
                                                                                                                                                                                          SHA1:6E92A2A9734A9C6B02ECCD99F114D667C909C5BA
                                                                                                                                                                                          SHA-256:7E7111F06288069B52A4E1CA0B016216DF9328FB3B1560A740146497CCDD4D24
                                                                                                                                                                                          SHA-512:5FFDE523021FC0C490261F55999204C9CE6C8C274888525EA6EE7C01BC5CCABC7A3877FD454B4167D81F4B89BACB087E8BA6AB0BAC46C2874ED9257BE2092340
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Berlin) {.. {-9223372036854775808 3208 0 LMT}.. {-2422054408 3600 0 CET}.. {-1693706400 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-938905200 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-776559600 10800 0 CEMT}.. {-765936000 7200 1 CEST}.. {-761180400 3600 0 CET}.. {-757386000 3600 0 CET}.. {-748479600 7200 1 CEST}.. {-733273200 3600 0 CET}.. {-717631200 7200 1 CEST}.. {-714610800 10800 1 CEMT}.. {-710380800 7200 1 CEST}.. {-701910000 3600 0 CET}.. {-684975600 7200 1 CEST}.. {-670460400 3600 0 CET}.. {-654130800 7200 1 CEST}.. {-639010800 3600 0 CET}.. {315529200 3600 0 CET}.. {323830800 7200
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):185
                                                                                                                                                                                          Entropy (8bit):4.943205109348136
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVtXrAeovXHAIgoquXrsY6RL/yQahcvEB5yQazXrH:SlSWB9vsM3ymzbAeSHAIgozbsY6N/y7c
                                                                                                                                                                                          MD5:C69AB60BE74D4BB7E31BE4E5ECCD8FD2
                                                                                                                                                                                          SHA1:9DD0BA6171080F074858EF88ADA2E91C1F465619
                                                                                                                                                                                          SHA-256:1D7C539AAA1E3AD5EF3574A629523B5B781F1A91D352C9B39B8DE7316756026E
                                                                                                                                                                                          SHA-512:C273B97CCFB5F328EB7A13CCA3126DE8D91B3876CBD248990C0BE063DDBE5B0F31EA138E31A1C5C43B1ABCF42EA511448E6DC589EB99E8172D7C2A68BA31A8E7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Prague)]} {.. LoadTimeZoneFile Europe/Prague..}..set TZData(:Europe/Bratislava) $TZData(:Europe/Prague)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):9223
                                                                                                                                                                                          Entropy (8bit):3.8450929464870804
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:RhcSQnG1Czyc1+FdDKDBb0S274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcM:Rh8zyc4Ss41sFpM5vwA6Efv03TBZLl
                                                                                                                                                                                          MD5:E6C1153C3F71C8C005D7A46DDF6461FB
                                                                                                                                                                                          SHA1:CBDF7D5D36AF57D83859C910B493464617EC9571
                                                                                                                                                                                          SHA-256:1402A2072ADC9EBB35F4C0368D2E9A7A11493626C667C022614FFB7CC05B6CB6
                                                                                                                                                                                          SHA-512:8B1B47678F75DBE59DB08E034F0701BD11FF4FD3AD0304C8ABF45E848F717D2787B8E47558D3C334D369E0938C633DC217178D3EAE6486CEFBE25CF1668479F6
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Brussels) {.. {-9223372036854775808 1050 0 LMT}.. {-2840141850 1050 0 BMT}.. {-2450995200 0 0 WET}.. {-1740355200 3600 0 CET}.. {-1693702800 7200 0 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-1613826000 0 0 WET}.. {-1604278800 3600 1 WEST}.. {-1585530000 0 0 WET}.. {-1574038800 3600 1 WEST}.. {-1552266000 0 0 WET}.. {-1539997200 3600 1 WEST}.. {-1520557200 0 0 WET}.. {-1507510800 3600 1 WEST}.. {-1490576400 0 0 WET}.. {-1473642000 3600 1 WEST}.. {-1459126800 0 0 WET}.. {-1444006800 3600 1 WEST}.. {-1427677200 0 0 WET}.. {-1411952400 3600 1 WEST}.. {-1396227600 0 0 WET}.. {-1379293200 3600 1 WEST}.. {-1364778000 0 0 WET}.. {-1348448400 3600 1 WEST}.. {-1333328400 0 0 WET}.. {-1316394000 3600 1 WEST}.. {-1301263200 0 0 WET}.. {
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7974
                                                                                                                                                                                          Entropy (8bit):3.7264631277913853
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:vMSsQMAz5CXNU5paNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBK0:vMS1kdUoivBeRF+W35Syrwl9h5j
                                                                                                                                                                                          MD5:88DB5686937D3499A8142413B2CF2EB5
                                                                                                                                                                                          SHA1:E37BAD2127553600D0E38A43053D1B07B2498DA8
                                                                                                                                                                                          SHA-256:C560D45104A8DD73FC7370B5AC1615E22043DBC93DFB46A9ECC6468C2D38B19A
                                                                                                                                                                                          SHA-512:375B8A63CFF2E278CD8C78BF9DBC86288FFB1AD57DAED00CD2199F0B05F4FBFA7D17D93C6458B20B86F6D05F3E3A49D594E60AC97DDB47141E21D7CDE10F8456
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Bucharest) {.. {-9223372036854775808 6264 0 LMT}.. {-2469404664 6264 0 BMT}.. {-1213148664 7200 0 EET}.. {-1187056800 10800 1 EEST}.. {-1175479200 7200 0 EET}.. {-1159754400 10800 1 EEST}.. {-1144029600 7200 0 EET}.. {-1127700000 10800 1 EEST}.. {-1111975200 7200 0 EET}.. {-1096250400 10800 1 EEST}.. {-1080525600 7200 0 EET}.. {-1064800800 10800 1 EEST}.. {-1049076000 7200 0 EET}.. {-1033351200 10800 1 EEST}.. {-1017626400 7200 0 EET}.. {-1001901600 10800 1 EEST}.. {-986176800 7200 0 EET}.. {-970452000 10800 1 EEST}.. {-954727200 7200 0 EET}.. {296604000 10800 1 EEST}.. {307486800 7200 0 EET}.. {323816400 10800 1 EEST}.. {338940000 7200 0 EET}.. {354672000 10800 0 EEST}.. {370396800 7200 0 EET}.. {386121600 10800 1 EEST}.. {401846400 7200 0 EET}.. {417571200 10800 1 EEST}.. {433296000 7200 0 EET}.. {449020800 10800 1 EEST}.. {465
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8287
                                                                                                                                                                                          Entropy (8bit):3.8244305880244567
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:rHw0+D5xp4elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxo:rQXj41sFpM5vwA6Efv03TBZLl
                                                                                                                                                                                          MD5:11468F958796F971ADD5FB1A0C426D78
                                                                                                                                                                                          SHA1:3FA58BEF391BCF7BAC6A124D093B6505B4EAC452
                                                                                                                                                                                          SHA-256:B58F3E9066B8B57EB037D509636AA67A06ACC8348BE6C48482D87CDC49844A4E
                                                                                                                                                                                          SHA-512:0492EABD6EE16392C00A196AF38995E5F9E55E30A82A50EFFB381DC978E9E63E801555CDC219869E6251BD51115972F742D8A7D9524372B8B11702AE4B28BFB7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Budapest) {.. {-9223372036854775808 4580 0 LMT}.. {-2498260580 3600 0 CET}.. {-1693706400 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1640998800 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-1600470000 7200 1 CEST}.. {-1587250800 3600 0 CET}.. {-1569711600 7200 1 CEST}.. {-1555196400 3600 0 CET}.. {-906775200 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-788922000 3600 0 CET}.. {-778471200 7200 1 CEST}.. {-762656400 3600 0 CET}.. {-749689200 7200 1 CEST}.. {-733276800 3600 0 CET}.. {-717634800 7200 1 CEST}.. {-701910000 3600 0 CET}.. {-686185200 7200 1 CEST}.. {-670460400 3600 0 CET}.. {-654130800 7200 1 CEST}.. {-639010800 3600 0 CET}.. {-492656400 7
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):183
                                                                                                                                                                                          Entropy (8bit):4.952483060656419
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVnCMPfXHAIgoqkCM4ARL/yQahDZALMFB5h8Qa5CMS:SlSWB9vsM3ym5XPHAIgo5gAN/y7D17/f
                                                                                                                                                                                          MD5:CED145F8D9B231234E021D2214C1064B
                                                                                                                                                                                          SHA1:7B111DC24CA01C78A382CECD3247CF495D71CD34
                                                                                                                                                                                          SHA-256:F511A80AB70FF93A0EB9F29293F73DF952B773BB33EB85D581E4FB1FE06E4F05
                                                                                                                                                                                          SHA-512:E2323C04BF99909ABA9A09A66F9B4696519B5F9FE3AF178FB04D5E0053F41CAA8B937DC4148954ED093D317F454E0547786BEC934F2ABF22A60AAA6A24E63BF9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Zurich)]} {.. LoadTimeZoneFile Europe/Zurich..}..set TZData(:Europe/Busingen) $TZData(:Europe/Zurich)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8096
                                                                                                                                                                                          Entropy (8bit):3.7635458172251406
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:jXSsijEpkv2XkN8qc/OyEie8hF5WQ9VX/Zs1cw27oXqdCA5XqjqFLigTE9s5VpJ:jXS+WeUqKie8hF5f9PwdXM9
                                                                                                                                                                                          MD5:E7F52393523729CA3916768B3F3B4E55
                                                                                                                                                                                          SHA1:1524A3E610DCD33AC0006946BAB2929CA7F5A33F
                                                                                                                                                                                          SHA-256:2BD1C0AB412A5E9C97F533C4D06B773D045215B92568A4E89ADC93C7462D62EC
                                                                                                                                                                                          SHA-512:218674ECD9FD6C1A1C83EE69AFE6AA5AD0D5A8BB59FF497FDF2573B7CF52DAE98ECE0815CF99668CA4E172FF67D220B227369865076333B3EE802A8839C65279
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Chisinau) {.. {-9223372036854775808 6920 0 LMT}.. {-2840147720 6900 0 CMT}.. {-1637114100 6264 0 BMT}.. {-1213148664 7200 0 EET}.. {-1187056800 10800 1 EEST}.. {-1175479200 7200 0 EET}.. {-1159754400 10800 1 EEST}.. {-1144029600 7200 0 EET}.. {-1127700000 10800 1 EEST}.. {-1111975200 7200 0 EET}.. {-1096250400 10800 1 EEST}.. {-1080525600 7200 0 EET}.. {-1064800800 10800 1 EEST}.. {-1049076000 7200 0 EET}.. {-1033351200 10800 1 EEST}.. {-1017626400 7200 0 EET}.. {-1001901600 10800 1 EEST}.. {-986176800 7200 0 EET}.. {-970452000 10800 1 EEST}.. {-954727200 7200 0 EET}.. {-927165600 10800 1 EEST}.. {-898138800 7200 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-800154000 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7722
                                                                                                                                                                                          Entropy (8bit):3.8237774522471564
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:vFKb+vS74elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxOR:vFKX41sFpM5vwA6Efv03TBZLl
                                                                                                                                                                                          MD5:F9BC892F4BAE6712718C75AA5A07E1C7
                                                                                                                                                                                          SHA1:D7BDB30B9E10A7B6FABB5A257F9F6C538C1E3371
                                                                                                                                                                                          SHA-256:C6ABC78AD0F03F903E04DB41067B555F9E589E321E253A01ED819189C6FFFC0E
                                                                                                                                                                                          SHA-512:A8F8BF7ED070A5DA021BC0A5F87003B7DE433EA66B38A09CA6BDC5F4DC964D35758AE325B0687694AA5F712EF563D1EB8444D11CBDD8332457AB8BBFF8602363
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Copenhagen) {.. {-9223372036854775808 3020 0 LMT}.. {-2524524620 3020 0 CMT}.. {-2398294220 3600 0 CET}.. {-1692496800 7200 1 CEST}.. {-1680490800 3600 0 CET}.. {-935110800 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-781052400 7200 0 CEST}.. {-769388400 3600 0 CET}.. {-747010800 7200 1 CEST}.. {-736383600 3600 0 CET}.. {-715215600 7200 1 CEST}.. {-706748400 3600 0 CET}.. {-683161200 7200 1 CEST}.. {-675298800 3600 0 CET}.. {315529200 3600 0 CET}.. {323830800 7200 1 CEST}.. {338950800 3600 0 CET}.. {354675600 7200 1 CEST}.. {370400400 3600 0 CET}.. {386125200 7200 1 CEST}.. {401850000 3600 0 CET}.. {417574800 7200 1 CEST}.. {433299600 3600 0 CET}.. {449024400 7200 1 CEST}.. {465354000 3600 0 CET}.. {481078800 7200 1 CEST}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):9810
                                                                                                                                                                                          Entropy (8bit):3.7669748644882417
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:fbxxHZiMU8EKTy74jT56XdEN1+UZBdMN186LPR:fbzZiMUZ6y0jT5bZHMN186LPR
                                                                                                                                                                                          MD5:726F01B47BB99952639200AB73E29425
                                                                                                                                                                                          SHA1:FF38CF353CE007BE871A27DDF836D198D21F167F
                                                                                                                                                                                          SHA-256:930F4E37B6D60B6701CBA95EEA1F6053D85E5F9DE6BBE287A0D43E24B9D63FB0
                                                                                                                                                                                          SHA-512:CF3567BCB23C75527F154C987FAFAD09A5E84E0745A3DB55D268688E5BB37D4E17E2D71EF608FA9C1CA99066BD384108AB9F8C7AD5CAC9A95BC6A541B0135699
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Dublin) {.. {-9223372036854775808 -1500 0 LMT}.. {-2821649700 -1521 0 DMT}.. {-1691962479 2079 1 IST}.. {-1680471279 0 0 GMT}.. {-1664143200 3600 1 BST}.. {-1650146400 0 0 GMT}.. {-1633903200 3600 1 BST}.. {-1617487200 0 0 GMT}.. {-1601848800 3600 1 BST}.. {-1586037600 0 0 GMT}.. {-1570399200 3600 1 BST}.. {-1552168800 0 0 GMT}.. {-1538344800 3600 1 BST}.. {-1522533600 0 0 GMT}.. {-1517011200 0 0 IST}.. {-1507500000 3600 1 IST}.. {-1490565600 0 0 IST}.. {-1473631200 3600 1 IST}.. {-1460930400 0 0 IST}.. {-1442786400 3600 1 IST}.. {-1428876000 0 0 IST}.. {-1410732000 3600 1 IST}.. {-1396216800 0 0 IST}.. {-1379282400 3600 1 IST}.. {-1364767200 0 0 IST}.. {-1348437600 3600 1 IST}.. {-1333317600 0 0 IST}.. {-1315778400 3600 1 IST}.. {-1301263200 0 0 IST}.. {-1284328800 3600 1 IST}.. {-1269813600 0 0 IST}.. {-1253484000 3600 1 IST
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):9509
                                                                                                                                                                                          Entropy (8bit):3.8837074152297704
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:QTOKVA1oCobz0W4x2+ZE74elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNA:QyoCvTZ641sFpM5vwA6Efv03TBZLl
                                                                                                                                                                                          MD5:D04F8EDDA1C3611692FB91E317CCADFE
                                                                                                                                                                                          SHA1:1C483FC95459EC6F1D5FE4DD275879A9EBCA1718
                                                                                                                                                                                          SHA-256:0524A31131405347C1D5D86C5EE38A2064AB055C030AB3B43F25DB3B28FFD8D2
                                                                                                                                                                                          SHA-512:4E2E18EBDE2765F2251B1FE41EF8E6AC79875617348974A28619F5E59EC0467239C682CCE8DEBD7A698BE2F00252C77D1F7FA50B6CAFF920B3BE53A0B836F815
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Gibraltar) {.. {-9223372036854775808 -1284 0 LMT}.. {-2821649916 0 0 GMT}.. {-1691964000 3600 1 BST}.. {-1680472800 0 0 GMT}.. {-1664143200 3600 1 BST}.. {-1650146400 0 0 GMT}.. {-1633903200 3600 1 BST}.. {-1617487200 0 0 GMT}.. {-1601848800 3600 1 BST}.. {-1586037600 0 0 GMT}.. {-1570399200 3600 1 BST}.. {-1552168800 0 0 GMT}.. {-1538344800 3600 1 BST}.. {-1522533600 0 0 GMT}.. {-1507500000 3600 1 BST}.. {-1490565600 0 0 GMT}.. {-1473631200 3600 1 BST}.. {-1460930400 0 0 GMT}.. {-1442786400 3600 1 BST}.. {-1428876000 0 0 GMT}.. {-1410732000 3600 1 BST}.. {-1396216800 0 0 GMT}.. {-1379282400 3600 1 BST}.. {-1364767200 0 0 GMT}.. {-1348437600 3600 1 BST}.. {-1333317600 0 0 GMT}.. {-1315778400 3600 1 BST}.. {-1301263200 0 0 GMT}.. {-1284328800 3600 1 BST}.. {-1269813600 0 0 GMT}.. {-1253484000 3600 1 BST}.. {-1238364000 0 0 GMT}
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):183
                                                                                                                                                                                          Entropy (8bit):4.879252060643389
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVxKL823vXHAIgoqyKL8H6RL/yQakQAL/yQavKL81n:SlSWB9vsM3ymvKA2PHAIgovKAH6N/yYU
                                                                                                                                                                                          MD5:07AF23DA01CB963EA9E57534E34E7704
                                                                                                                                                                                          SHA1:1C4A214FF3B722E80C0ECACA0FFD5DFF302F6AE9
                                                                                                                                                                                          SHA-256:F7046808A8E80B7AE449D1A49AE3E480096736B7D3F554A240C7DFB10F82076A
                                                                                                                                                                                          SHA-512:713860D340C0EBA5EEF873ECB9B28CCDE9BFAD31B6A8626EF507E96585F5CC1091BF8D8A2DB7E5CB532E44F4561FBAE1797141724EF934755B69919FEA09A78A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/London)]} {.. LoadTimeZoneFile Europe/London..}..set TZData(:Europe/Guernsey) $TZData(:Europe/London)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7368
                                                                                                                                                                                          Entropy (8bit):3.7258352536809705
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:OsR0uO7DVopaNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBKb0hzj:OkyDjivBeRF+W35Syrwl9h5j
                                                                                                                                                                                          MD5:7FF902B06FA79F14553670A70E77FF8C
                                                                                                                                                                                          SHA1:0105051541F38956EA6192BD0C7ED4047668005E
                                                                                                                                                                                          SHA-256:5B5C0A9261A414EA8DC34F594EE05BEE16F695488B230857D2B569A6B603BC39
                                                                                                                                                                                          SHA-512:551940199783A0FF9D73695B77B10300644F50E91D6B02FE79BB0CD4B78C7BA88CCE56F4B9408EC146361BF408F52D01A1F435183360C801EA5E219FB718247F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Helsinki) {.. {-9223372036854775808 5989 0 LMT}.. {-2890258789 5989 0 HMT}.. {-1535938789 7200 0 EET}.. {-875671200 10800 1 EEST}.. {-859773600 7200 0 EET}.. {354672000 10800 1 EEST}.. {370396800 7200 0 EET}.. {386121600 10800 1 EEST}.. {401846400 7200 0 EET}.. {410220000 7200 0 EET}.. {417574800 10800 1 EEST}.. {433299600 7200 0 EET}.. {449024400 10800 1 EEST}.. {465354000 7200 0 EET}.. {481078800 10800 1 EEST}.. {496803600 7200 0 EET}.. {512528400 10800 1 EEST}.. {528253200 7200 0 EET}.. {543978000 10800 1 EEST}.. {559702800 7200 0 EET}.. {575427600 10800 1 EEST}.. {591152400 7200 0 EET}.. {606877200 10800 1 EEST}.. {622602000 7200 0 EET}.. {638326800 10800 1 EEST}.. {654656400 7200 0 EET}.. {670381200 10800 1 EEST}.. {686106000 7200 0 EET}.. {701830800 10800 1 EEST}.. {717555600 7200 0 EET}.. {733280400 10800 1 EEST}.. {749
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):186
                                                                                                                                                                                          Entropy (8bit):4.914274131294981
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVxKL823vXHAIgoqyKL8H6RL/yQaqpfioxp8QavKLS:SlSWB9vsM3ymvKA2PHAIgovKAH6N/ycS
                                                                                                                                                                                          MD5:F9A0F19FAF3131D8A70C50FF21B365B7
                                                                                                                                                                                          SHA1:7FC2B5302FAD06BC4C633CD22A80A7D40073FFF8
                                                                                                                                                                                          SHA-256:2F1151B0528A5325443379D4E7CCE32C00213722AD9DF764E1DC90198084B076
                                                                                                                                                                                          SHA-512:6D04DF4480FE132A6641C4BF7E01936E2E4A71A3A6C2AB9F7DA7A9D8A4B836BC66EE2BB597B8C318D07A06F72C05B07E6785B53308ED9BC1103AE6DBDD0FF24E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/London)]} {.. LoadTimeZoneFile Europe/London..}..set TZData(:Europe/Isle_of_Man) $TZData(:Europe/London)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):3683
                                                                                                                                                                                          Entropy (8bit):3.814835316757376
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:Qi0p05zvSPBUUl0ZFzo4ay0CREDcxn6nH78BV0QbCgkCPviiM0H7hdli80+j7x9L:Qiq66OFEIFMssCfMsXV3heM2MRlA0
                                                                                                                                                                                          MD5:A8256656B971F58CB991BC270BF93B26
                                                                                                                                                                                          SHA1:189796E1B8E29A7A7B8B0E143DD9B44BAF217AB2
                                                                                                                                                                                          SHA-256:08061A80FC0F1EF375EEFE784EACDF0812E289FD67E8613BDEC36209985CA1D7
                                                                                                                                                                                          SHA-512:1F11308B5BAC1F3DB75CAC7322BBEA6E51C6B4A2A3450F1DB84DE6AA127F0F1BAA7DAB409FAF1288C100BDA77DA6FA1C6E3C0BA962F9406D1445D7C9E2AA3A60
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Istanbul) {.. {-9223372036854775808 6952 0 LMT}.. {-2840147752 7016 0 IMT}.. {-1869875816 7200 0 EET}.. {-1693706400 10800 1 EEST}.. {-1680490800 7200 0 EET}.. {-1570413600 10800 1 EEST}.. {-1552186800 7200 0 EET}.. {-1538359200 10800 1 EEST}.. {-1522551600 7200 0 EET}.. {-1507514400 10800 1 EEST}.. {-1490583600 7200 0 EET}.. {-1440208800 10800 1 EEST}.. {-1428030000 7200 0 EET}.. {-1409709600 10800 1 EEST}.. {-1396494000 7200 0 EET}.. {-931053600 10800 1 EEST}.. {-922676400 7200 0 EET}.. {-917834400 10800 1 EEST}.. {-892436400 7200 0 EET}.. {-875844000 10800 1 EEST}.. {-764737200 7200 0 EET}.. {-744343200 10800 1 EEST}.. {-733806000 7200 0 EET}.. {-716436000 10800 1 EEST}.. {-701924400 7200 0 EET}.. {-684986400 10800 1 EEST}.. {-670474800 7200 0 EET}.. {-654141600 10800 1 EEST}.. {-639025200 7200 0 EET}.. {-622087200 10800 1 EEST}.
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):181
                                                                                                                                                                                          Entropy (8bit):4.8801202136140915
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVxKL823vXHAIgoqyKL8H6RL/yQap6cEBx/yQavKLS:SlSWB9vsM3ymvKA2PHAIgovKAH6N/yzx
                                                                                                                                                                                          MD5:FE10770868A75F4F8D76C5E23D99AA81
                                                                                                                                                                                          SHA1:30AC768BA47AF7A53831F5142B58ECEC41933621
                                                                                                                                                                                          SHA-256:97EB33915ED7C9C34144F8F42357FAB2262B3CD45287F3CFFD26C33D65F7651E
                                                                                                                                                                                          SHA-512:1D82DF45AB0CCDFBFAD0431C668794996E01776800F34DD4131C5287D37291657A749D497AA5B0AB81CAFF3190896633FBFF456BFFEB7E93A3420AA841E54842
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/London)]} {.. LoadTimeZoneFile Europe/London..}..set TZData(:Europe/Jersey) $TZData(:Europe/London)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2512
                                                                                                                                                                                          Entropy (8bit):3.941165221943348
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:coNlj+X2uxhuHJkw0QqXknzaVV04v3TfdGY3kNmneVuNlh000sGpdh:coN9+1EpkwCXkSV3A8qc0
                                                                                                                                                                                          MD5:104CCB93300F40BAF8F4D7CC882EFC05
                                                                                                                                                                                          SHA1:EA83F3C3791BD6F083844939DC405B248E738FE3
                                                                                                                                                                                          SHA-256:2387D26DF5429DF9867F42F7D4F872DC146643B4B3CC57DA7298C18561DE8BFE
                                                                                                                                                                                          SHA-512:12724C5BBEE0835626A98B66BF55C3DF1311F07018C70D76FC5C50E7E7BA5C4A9F064D9EDC376CC3B06C4FFFECA3FAF5B66948615A03DFECA7C361E326D950EA
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Kaliningrad) {.. {-9223372036854775808 4920 0 LMT}.. {-2422056120 3600 0 CET}.. {-1693706400 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-938905200 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-780368400 7200 0 EET}.. {-778730400 10800 1 EEST}.. {-762663600 7200 0 EET}.. {-749095200 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7453
                                                                                                                                                                                          Entropy (8bit):3.762620506765216
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:j3C1LyEpkvIpaNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBKb0hH:j3C9VWdivBeRF+W35Syrwl9h5j
                                                                                                                                                                                          MD5:1F0C92A6E5C6BAD82AD7E35814ACC388
                                                                                                                                                                                          SHA1:F29C94DF4EE211481051186BBE5CD77EEDC6C33F
                                                                                                                                                                                          SHA-256:08B137B7B933393F8F4574615A370013288E5297937B5C59D4179744273FAB26
                                                                                                                                                                                          SHA-512:88E8B89439022D219D752340E28C21E461D8E288DA135DA4765C87037B610515E6D9E1B716707025B5BAE652FA2F2A89577949C8A923E5C8667AA6CB5C1BAD7A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Kiev) {.. {-9223372036854775808 7324 0 LMT}.. {-2840148124 7324 0 KMT}.. {-1441159324 7200 0 EET}.. {-1247536800 10800 0 MSK}.. {-892522800 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-825382800 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10800 0 MSK}.. {606870000 14400 1 MSD}.. {622594800 10800 0 MSK}.. {638319600 14400 1 MSD}.. {646786800 10800 1 EEST}.. {686102400 7200 0 EET}.. {701820000 10800 1 EEST}.. {7175
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2029
                                                                                                                                                                                          Entropy (8bit):3.668326642402654
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:FFvCAs6kKR6aQmF1cSNWrI+AjXgV/Ap40FjDM:FhCAs6kC6aZF1cSN4I+AjXgV/ApDFjDM
                                                                                                                                                                                          MD5:57BB199152815B12FE4491C92FE25186
                                                                                                                                                                                          SHA1:7BC5ECDE9EFADE812AF40CB92CCE5323FB57C78D
                                                                                                                                                                                          SHA-256:60884D4B8B17A9AB8FB5697DA95F62E570755348109C661D783D56CD047BBE9E
                                                                                                                                                                                          SHA-512:2043FDBA860E8F6578F7E26A80C7787B82C7D15188327923EC36D153FDF9BEEAE063012ACE4309B76DB9DBA2DFFB7404DE370BA85023CCE93159FCAD3B9B92B5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Kirov) {.. {-9223372036854775808 11928 0 LMT}.. {-1593820800 10800 0 +03}.. {-1247540400 14400 0 +05}.. {354916800 18000 1 +05}.. {370724400 14400 0 +04}.. {386452800 18000 1 +05}.. {402260400 14400 0 +04}.. {417988800 18000 1 +05}.. {433796400 14400 0 +04}.. {449611200 18000 1 +05}.. {465343200 14400 0 +04}.. {481068000 18000 1 +05}.. {496792800 14400 0 +04}.. {512517600 18000 1 +05}.. {528242400 14400 0 +04}.. {543967200 18000 1 +05}.. {559692000 14400 0 +04}.. {575416800 18000 1 +05}.. {591141600 14400 0 +04}.. {606866400 10800 0 +04}.. {606870000 14400 1 +04}.. {622594800 10800 0 +03}.. {638319600 14400 1 +04}.. {654649200 10800 0 +03}.. {670374000 14400 0 +04}.. {701820000 10800 0 +04}.. {701823600 14400 1 +04}.. {717548400 10800 0 +03}.. {733273200 14400 1 +04}.. {748998000 10800 0 +03}.. {764722800 14400 1 +04}.. {78044
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):9878
                                                                                                                                                                                          Entropy (8bit):3.8275310275285723
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:j76abXsyZLEjx82YbtIaFF1w0us4qE3+sSGjT:j77bXsyZLEjx82atysLE3+sSGjT
                                                                                                                                                                                          MD5:0DA331C2A815739E6758797BD24554EA
                                                                                                                                                                                          SHA1:3829C441E908BEFDC4ED6AB65FD4ACD0C97D5E1B
                                                                                                                                                                                          SHA-256:9FAC9812411F88014779D34722F3E0D2750E45BF21595DF1AE14CB9CCFD3F33F
                                                                                                                                                                                          SHA-512:FEBBA05F64AC1F3066AF6351493DD89768154FD171D447503DAEDB90D16858BEDBCE4A74E24AC0C37B5FF191692AF44AADDE4A92E752F88C48DA646352AD9A0B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Lisbon) {.. {-9223372036854775808 -2205 0 LMT}.. {-2713908195 -2205 0 LMT}.. {-1830384000 0 0 WET}.. {-1689555600 3600 1 WEST}.. {-1677801600 0 0 WET}.. {-1667437200 3600 1 WEST}.. {-1647738000 0 0 WET}.. {-1635814800 3600 1 WEST}.. {-1616202000 0 0 WET}.. {-1604365200 3600 1 WEST}.. {-1584666000 0 0 WET}.. {-1572742800 3600 1 WEST}.. {-1553043600 0 0 WET}.. {-1541206800 3600 1 WEST}.. {-1521507600 0 0 WET}.. {-1442451600 3600 1 WEST}.. {-1426813200 0 0 WET}.. {-1379293200 3600 1 WEST}.. {-1364778000 0 0 WET}.. {-1348448400 3600 1 WEST}.. {-1333328400 0 0 WET}.. {-1316394000 3600 1 WEST}.. {-1301274000 0 0 WET}.. {-1284339600 3600 1 WEST}.. {-1269824400 0 0 WET}.. {-1221440400 3600 1 WEST}.. {-1206925200 0 0 WET}.. {-1191200400 3600 1 WEST}.. {-1175475600 0 0 WET}.. {-1127696400 3600 1 WEST}.. {-1111971600 0 0 WET}.. {-1096851
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):190
                                                                                                                                                                                          Entropy (8bit):4.948438246006353
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV/sUE2tovXHAIgoq8sUE2oAovRL/yQavPSJ5Qahs0:SlSWB9vsM3ymhrE2tSHAIgohrE2LovNl
                                                                                                                                                                                          MD5:56C6C95484FEAF9BAF755683E7417B58
                                                                                                                                                                                          SHA1:A43176BEBC5B4D7144A7E1109E0AAEFD95C21EC6
                                                                                                                                                                                          SHA-256:713A842197516D618F2D86977262542A1CA334D7DF6026539FA2F2980DBF4CD3
                                                                                                                                                                                          SHA-512:566B6DF2D76A8A4D3405C4785C7A471A23D65CD8838831BD0DEDF5BF194E8A3B304CA9920CB4A8EC9D6CD60EAA9BE0335E38D9547A4D23C7E4E5E5A39A09DDAC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Belgrade)]} {.. LoadTimeZoneFile Europe/Belgrade..}..set TZData(:Europe/Ljubljana) $TZData(:Europe/Belgrade)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):10211
                                                                                                                                                                                          Entropy (8bit):3.826887992237191
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:GNoCvTZtcf80KYiK3BG0Myj9TYQOeMAwbccM0Fp:GNNTZtcf15iOBG08eNwbccM0Fp
                                                                                                                                                                                          MD5:0625C99E16D3C956DED1C0C0F867DEC3
                                                                                                                                                                                          SHA1:6ACDF0DB619B63E21EC89046B9320A85FBD3397A
                                                                                                                                                                                          SHA-256:D04C4E25DF4DE1C1CFE1EF84B3B6DD746CF08A271AB0958F22C7D580A3ED10E6
                                                                                                                                                                                          SHA-512:07AC42F0635DF01CC0AFD13F9668B143D4943BA0E4C377D254B5AF034D9DDBAB77BA813187E9AB73D2EEAD86EBAA26DC15599FD74FC82EEF287F5A6AB9C01635
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/London) {.. {-9223372036854775808 -75 0 LMT}.. {-3852662325 0 0 GMT}.. {-1691964000 3600 1 BST}.. {-1680472800 0 0 GMT}.. {-1664143200 3600 1 BST}.. {-1650146400 0 0 GMT}.. {-1633903200 3600 1 BST}.. {-1617487200 0 0 GMT}.. {-1601848800 3600 1 BST}.. {-1586037600 0 0 GMT}.. {-1570399200 3600 1 BST}.. {-1552168800 0 0 GMT}.. {-1538344800 3600 1 BST}.. {-1522533600 0 0 GMT}.. {-1507500000 3600 1 BST}.. {-1490565600 0 0 GMT}.. {-1473631200 3600 1 BST}.. {-1460930400 0 0 GMT}.. {-1442786400 3600 1 BST}.. {-1428876000 0 0 GMT}.. {-1410732000 3600 1 BST}.. {-1396216800 0 0 GMT}.. {-1379282400 3600 1 BST}.. {-1364767200 0 0 GMT}.. {-1348437600 3600 1 BST}.. {-1333317600 0 0 GMT}.. {-1315778400 3600 1 BST}.. {-1301263200 0 0 GMT}.. {-1284328800 3600 1 BST}.. {-1269813600 0 0 GMT}.. {-1253484000 3600 1 BST}.. {-1238364000 0 0 GMT}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):9139
                                                                                                                                                                                          Entropy (8bit):3.8497931755359303
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:TkR06ZldaKsc1+FpbdKDBb0S274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiT1:wxRscASs41sFpM5vwA6Efv03TBZLl
                                                                                                                                                                                          MD5:789594ED1BB0EDA605DFB567C1E7FE9E
                                                                                                                                                                                          SHA1:66C7116CCBED0917A429BB277CF4E0B3361A5B41
                                                                                                                                                                                          SHA-256:380E49D38F6ABE946A90A9343A277ED28492EB800747D6D14F4639FD3EA80EDE
                                                                                                                                                                                          SHA-512:62CC68E72E79B7A377EAFE92B64D829CD5B9651FCA6782DEF4886C91BB9DF5FCFCD0CF8C5C7628F49E8C523A4AF917DA2745ABA56107683CA014C3E0254E780E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Luxembourg) {.. {-9223372036854775808 1476 0 LMT}.. {-2069713476 3600 0 CET}.. {-1692496800 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {-1662343200 7200 1 CEST}.. {-1650157200 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-1612659600 0 0 WET}.. {-1604278800 3600 1 WEST}.. {-1585519200 0 0 WET}.. {-1574038800 3600 1 WEST}.. {-1552258800 0 0 WET}.. {-1539997200 3600 1 WEST}.. {-1520550000 0 0 WET}.. {-1507510800 3600 1 WEST}.. {-1490572800 0 0 WET}.. {-1473642000 3600 1 WEST}.. {-1459119600 0 0 WET}.. {-1444006800 3600 1 WEST}.. {-1427673600 0 0 WET}.. {-1411866000 3600 1 WEST}.. {-1396224000 0 0 WET}.. {-1379293200 3600 1 WEST}.. {-1364774400 0 0 WET}.. {-1348448400 3600 1 WEST}.. {-1333324800 0 0 WET}.. {-1316394000 3600 1 WEST}.. {-1301270400 0 0 WET}.. {-1284339600 3600 1 WEST}.. {-1269813600 0 0 WET}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8517
                                                                                                                                                                                          Entropy (8bit):3.8326167134909177
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:k5m01LdXKc0TJp+bwS274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOn:+DaNVLSs41sFpM5vwA6Efv03TBZLl
                                                                                                                                                                                          MD5:63263380F57B756A1DFA3796E4188CD3
                                                                                                                                                                                          SHA1:8EEE707AC4FEA1C098C81AC2D289A46239121A5E
                                                                                                                                                                                          SHA-256:5337C9843C56DEEC6B91C4468C76EC1C896E80421B72B583B69DE5579063E09A
                                                                                                                                                                                          SHA-512:ACA4830020715C471741E27EB2292ACF002D2CD7EDCD1061978B64967EB447F61AA095F960D8A75A01B9B87558D83FF409F30BDACA83E063024F1E2381FA64C4
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Madrid) {.. {-9223372036854775808 -884 0 LMT}.. {-2177452800 0 0 WET}.. {-1631926800 3600 1 WEST}.. {-1616889600 0 0 WET}.. {-1601168400 3600 1 WEST}.. {-1585353600 0 0 WET}.. {-1442451600 3600 1 WEST}.. {-1427673600 0 0 WET}.. {-1379293200 3600 1 WEST}.. {-1364774400 0 0 WET}.. {-1348448400 3600 1 WEST}.. {-1333324800 0 0 WET}.. {-1316390400 3600 1 WEST}.. {-1301270400 0 0 WET}.. {-1284339600 3600 1 WEST}.. {-1269820800 0 0 WET}.. {-1026954000 3600 1 WEST}.. {-1017619200 0 0 WET}.. {-1001898000 3600 1 WEST}.. {-999482400 7200 1 WEMT}.. {-986090400 3600 1 WEST}.. {-954115200 0 0 WET}.. {-940208400 3600 0 CET}.. {-873079200 7200 1 CEST}.. {-862621200 3600 0 CET}.. {-842839200 7200 1 CEST}.. {-828320400 3600 0 CET}.. {-811389600 7200 1 CEST}.. {-796870800 3600 0 CET}.. {-779940000 7200 1 CEST}.. {-765421200 3600 0 CET}.. {-74849
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8724
                                                                                                                                                                                          Entropy (8bit):3.816380386871747
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:KAGvi2GmkwwnpH74elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZN:KLsww141sFpM5vwA6Efv03TBZLl
                                                                                                                                                                                          MD5:9B09D6EED8F23BAFFB62929C0115E852
                                                                                                                                                                                          SHA1:4AEF15333C73C2836C09D818FD0E20440D7C4780
                                                                                                                                                                                          SHA-256:C5C240BAAECE8235D1FBDD251C1A67CB2D2FC8195DD5BBE37FF9CFF0445FCDA2
                                                                                                                                                                                          SHA-512:43AA3492BD335A290C6EFEE275B47EA18E544199E37A9BBAE2E350D42BDFF42F0E9ED461A4BB1824CA33F84A90D4060906844A3E22DA49C9821E4CB460832D6E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Malta) {.. {-9223372036854775808 3484 0 LMT}.. {-2403478684 3600 0 CET}.. {-1690765200 7200 1 CEST}.. {-1680487200 3600 0 CET}.. {-1664758800 7200 1 CEST}.. {-1648951200 3600 0 CET}.. {-1635123600 7200 1 CEST}.. {-1616896800 3600 0 CET}.. {-1604278800 7200 1 CEST}.. {-1585533600 3600 0 CET}.. {-1571014800 7200 1 CEST}.. {-1555293600 3600 0 CET}.. {-932432400 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812588400 7200 1 CEST}.. {-798073200 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-766717200 3600 0 CET}.. {-750898800 7200 1 CEST}.. {-733359600 3600 0 CET}.. {-719456400 7200 1 CEST}.. {-701917200 3600 0 CET}.. {-689209200 7200 1 CEST}.. {-670460400 3600 0 CET}.. {-114051600 7200 1 CEST}.. {-103168800 3600 0 CET}.. {-81997200 7200 1 CEST}.. {-71715600 3600 0 CET}.. {-50547600 7200 1
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):190
                                                                                                                                                                                          Entropy (8bit):4.959733196757503
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV1AYKjG5XHAIgoq2AYKjo0ARL/yQausWILMFJ8QaC:SlSWB9vsM3ymrAdjGJHAIgorAdjo0ANn
                                                                                                                                                                                          MD5:C1844961691214F6E6DF6487788A7758
                                                                                                                                                                                          SHA1:6D08E9FB7B8602A80622148BFACD9676F45F0E2B
                                                                                                                                                                                          SHA-256:6136C3CFA4A767E7C9DDA23A283AD98B72E9868F192E6A8E3BFE6396F6989BD1
                                                                                                                                                                                          SHA-512:B2D1EA51AC5B34792AC02820A9D60FD41F3B91AB6505896476FCB0DC339B8DC1DE9E2C89A7627F69E16247661AE8040D789FFD2F8F1CD59F243B57C4845B450F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Helsinki)]} {.. LoadTimeZoneFile Europe/Helsinki..}..set TZData(:Europe/Mariehamn) $TZData(:Europe/Helsinki)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2177
                                                                                                                                                                                          Entropy (8bit):3.9354590900153172
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:K8cVnR7xhuHJkminzaVV04v3TfdGY3kNmneVuNlh000sGpde:5mnRtEpkmiSV3A8qcN
                                                                                                                                                                                          MD5:9C10EAE9FA0DE192C5FD4F76E12606F0
                                                                                                                                                                                          SHA1:AFD5650410EC3E6ED564A8B2ABF91709D090B4AD
                                                                                                                                                                                          SHA-256:8C95EA696EA578DEF726502AC181AF475A676030878F56B4E2D667757BBD1C49
                                                                                                                                                                                          SHA-512:3B9ED6B68858485B9A46A0863B7D9D3C1E4C5BBA269457F24A9A12C274F0F9B35E63D8C25EB53E7200DB57DD35ACCB7FD7D8AB005FEE2C4D7FC6E72E8CF57194
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Minsk) {.. {-9223372036854775808 6616 0 LMT}.. {-2840147416 6600 0 MMT}.. {-1441158600 7200 0 EET}.. {-1247536800 10800 0 MSK}.. {-899780400 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-804646800 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10800 0 MSK}.. {606870000 14400 1 MSD}.. {622594800 10800 0 MSK}.. {631141200 10800 0 MSK}.. {670374000 7200 0 EEMMTT}.. {670377600 10800 1 EEST}.. {
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):9186
                                                                                                                                                                                          Entropy (8bit):3.856050322706834
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:2d4STO1C+4qoM9JfKDBb0S274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcot:wvp+hSs41sFpM5vwA6Efv03TBZLl
                                                                                                                                                                                          MD5:859DF194457CED25EA3EC247CDEA5025
                                                                                                                                                                                          SHA1:970579F53446EBE50438CC3582D88094C7D7DEEB
                                                                                                                                                                                          SHA-256:654B92E8B9E8FBDC967D094B48110908F458454D7057F680AC745B9C8D48FCC1
                                                                                                                                                                                          SHA-512:3E589FC8CA5E0B0F7F6F17A6983813460AB7E07B9B631D8380836F00A8288FF80650D4139B2A6DEDFF245DE571C7726E087DFF3E6F5F9E7E9C9DFE72B839DC7A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Monaco) {.. {-9223372036854775808 1772 0 LMT}.. {-2448318572 561 0 PMT}.. {-1854403761 0 0 WET}.. {-1689814800 3600 1 WEST}.. {-1680397200 0 0 WET}.. {-1665363600 3600 1 WEST}.. {-1648342800 0 0 WET}.. {-1635123600 3600 1 WEST}.. {-1616893200 0 0 WET}.. {-1604278800 3600 1 WEST}.. {-1585443600 0 0 WET}.. {-1574038800 3600 1 WEST}.. {-1552266000 0 0 WET}.. {-1539997200 3600 1 WEST}.. {-1520557200 0 0 WET}.. {-1507510800 3600 1 WEST}.. {-1490576400 0 0 WET}.. {-1470618000 3600 1 WEST}.. {-1459126800 0 0 WET}.. {-1444006800 3600 1 WEST}.. {-1427677200 0 0 WET}.. {-1411952400 3600 1 WEST}.. {-1396227600 0 0 WET}.. {-1379293200 3600 1 WEST}.. {-1364778000 0 0 WET}.. {-1348448400 3600 1 WEST}.. {-1333328400 0 0 WET}.. {-1316394000 3600 1 WEST}.. {-1301274000 0 0 WET}.. {-1284339600 3600 1 WEST}.. {-1269824400 0 0 WET}.. {-1253494800
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2430
                                                                                                                                                                                          Entropy (8bit):3.942836780611272
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:7fnjazk7e+LxhuHJkvVineTeCTU50x0Y7:7fnjazk7eoEpkvVieTeCTUax0Y7
                                                                                                                                                                                          MD5:4547D47E9364ACAFB2A4BEE52D04BFBB
                                                                                                                                                                                          SHA1:1E7F964692F81D49AEAF581FE70AD22D4E36226B
                                                                                                                                                                                          SHA-256:31F9C3C2F17B3EE4FA6D9EE6A86BF407AC0377DE4D666C65E86CE5AC591F829F
                                                                                                                                                                                          SHA-512:7F1D7C80A1BF611D5440EEF9085DA6CDED86B5EF4C2737C105640030E5AA998A0951182E72DC224190A25DA8846CDE856A78EBAA8876AA0B18B1CBCADBB060FF
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Moscow) {.. {-9223372036854775808 9017 0 LMT}.. {-2840149817 9017 0 MMT}.. {-1688265017 9079 0 MMT}.. {-1656819079 12679 1 MST}.. {-1641353479 9079 0 MMT}.. {-1627965079 16279 1 MDST}.. {-1618716679 12679 1 MST}.. {-1596429079 16279 1 MDST}.. {-1593820800 14400 0 MSD}.. {-1589860800 10800 0 MSK}.. {-1542427200 14400 1 MSD}.. {-1539493200 18000 1 +05}.. {-1525323600 14400 1 MSD}.. {-1491188400 7200 0 EET}.. {-1247536800 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):179
                                                                                                                                                                                          Entropy (8bit):4.7873368289068905
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq85GKLlXHAIgNwMGKLZRRL/yQatHefeWFKYGKL8n:SlSWB9vsM3yZdL1HAIgGMdLZRN/y3HeA
                                                                                                                                                                                          MD5:BE82205480617CF07F76BA0DF06C95BC
                                                                                                                                                                                          SHA1:46D2D8D9FE4FB570C2A09BC809B02C8960F9601F
                                                                                                                                                                                          SHA-256:FC93B7516933EDFDC211AC0822EE88BF7ACAD1C58A0643B15294F82EB0F14414
                                                                                                                                                                                          SHA-512:F490A70053A6011D80FB0A4E96D2871BFEEB168690E21C4EC31F2F5C0E24A67C706528C81322A1D48E71242F0FFA277550192925FDE5B1F34BFCB308290E11FC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Nicosia)]} {.. LoadTimeZoneFile Asia/Nicosia..}..set TZData(:Europe/Nicosia) $TZData(:Asia/Nicosia)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7922
                                                                                                                                                                                          Entropy (8bit):3.818430983275607
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:MC+4twRQqvSO774elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhn:MXRQqvSOv41sFpM5vwA6Efv03TBZLl
                                                                                                                                                                                          MD5:9923D3F3C50D2BD96BD36558FBCD8E92
                                                                                                                                                                                          SHA1:56584B8B9CB27B0ADCAD490C029EE58308C4D7C5
                                                                                                                                                                                          SHA-256:5A28B5CEC79B57D4856E3F05615245E6F74DF6388B48BF3F605B792CA3BD972D
                                                                                                                                                                                          SHA-512:1FA928EA5F468F2B4AA40B6B73CE6E42267832413B333C399431FE08C6CB4FD4BDD7E3DB15682C76E5EDEB5849224F1EE5B9667E68A8C5C89AF09B075E4F7755
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Oslo) {.. {-9223372036854775808 2580 0 LMT}.. {-2366757780 3600 0 CET}.. {-1691884800 7200 1 CEST}.. {-1680573600 3600 0 CET}.. {-927511200 7200 0 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-781052400 7200 0 CEST}.. {-765327600 3600 0 CET}.. {-340844400 7200 1 CEST}.. {-324514800 3600 0 CET}.. {-308790000 7200 1 CEST}.. {-293065200 3600 0 CET}.. {-277340400 7200 1 CEST}.. {-261615600 3600 0 CET}.. {-245890800 7200 1 CEST}.. {-230166000 3600 0 CET}.. {-214441200 7200 1 CEST}.. {-198716400 3600 0 CET}.. {-182991600 7200 1 CEST}.. {-166662000 3600 0 CET}.. {-147913200 7200 1 CEST}.. {-135212400 3600 0 CET}.. {315529200 3600 0 CET}.. {323830800 7200 1 CEST}.. {338950800 3600 0 CET}.. {354675600 7200 1 CEST}.. {370400400 3600 0 CET}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):9152
                                                                                                                                                                                          Entropy (8bit):3.8506895725632746
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:fySTO1C+4qoMYOKDBb0S274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdi:fdp+3Ss41sFpM5vwA6Efv03TBZLl
                                                                                                                                                                                          MD5:9CAF8C5C5AF630E7F782C0480DD786E7
                                                                                                                                                                                          SHA1:9FBEF9EEDD8BAFB48B17E3AC388CFEF8DCD10CB0
                                                                                                                                                                                          SHA-256:AE61491C4A587F56426A9F2118E31060276F2B0231E750C461781577551CA196
                                                                                                                                                                                          SHA-512:F809744BB597184A2815758A27B6A07C515C65DB96CFFB3625FD059DEBBF05EE903E999483B3459C7C8D3991824746F8530CD1378F8A63B1F54F60CFACE9F89B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Paris) {.. {-9223372036854775808 561 0 LMT}.. {-2486592561 561 0 PMT}.. {-1855958961 0 0 WET}.. {-1689814800 3600 1 WEST}.. {-1680397200 0 0 WET}.. {-1665363600 3600 1 WEST}.. {-1648342800 0 0 WET}.. {-1635123600 3600 1 WEST}.. {-1616893200 0 0 WET}.. {-1604278800 3600 1 WEST}.. {-1585443600 0 0 WET}.. {-1574038800 3600 1 WEST}.. {-1552266000 0 0 WET}.. {-1539997200 3600 1 WEST}.. {-1520557200 0 0 WET}.. {-1507510800 3600 1 WEST}.. {-1490576400 0 0 WET}.. {-1470618000 3600 1 WEST}.. {-1459126800 0 0 WET}.. {-1444006800 3600 1 WEST}.. {-1427677200 0 0 WET}.. {-1411952400 3600 1 WEST}.. {-1396227600 0 0 WET}.. {-1379293200 3600 1 WEST}.. {-1364778000 0 0 WET}.. {-1348448400 3600 1 WEST}.. {-1333328400 0 0 WET}.. {-1316394000 3600 1 WEST}.. {-1301274000 0 0 WET}.. {-1284339600 3600 1 WEST}.. {-1269824400 0 0 WET}.. {-1253494800 3
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):190
                                                                                                                                                                                          Entropy (8bit):4.910162937111088
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV/sUE2tovXHAIgoq8sUE2oAovRL/yQazKIGl1/yQ0:SlSWB9vsM3ymhrE2tSHAIgohrE2LovNK
                                                                                                                                                                                          MD5:52C36955D6BD1D9FE9CB64822D04B6DB
                                                                                                                                                                                          SHA1:D5FF82EC486409E6FB314AD5ACE608577C9632CF
                                                                                                                                                                                          SHA-256:B87630FF459DE07EB16CD0C2452660772E3FFC4EEB8419EA77A013B6F63A5900
                                                                                                                                                                                          SHA-512:ABA49D3F05A41A4982600E4DA5C225D8994251F447401EE6FE8478E008BCD5D41C057034185B5CFF805634D571F3CC98EFE98093ABC8E6271351E11A4DA1E7AD
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Belgrade)]} {.. LoadTimeZoneFile Europe/Belgrade..}..set TZData(:Europe/Podgorica) $TZData(:Europe/Belgrade)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8038
                                                                                                                                                                                          Entropy (8bit):3.8240363895915914
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:Kr9+neXAS274elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlh:KnASs41sFpM5vwA6Efv03TBZLl
                                                                                                                                                                                          MD5:828134FA1263FEFA2B06A8B2F075F564
                                                                                                                                                                                          SHA1:4B332DE6E0855F8B9517F7098A3FB439671FC349
                                                                                                                                                                                          SHA-256:5D3AFED5C1B07C6C6635D6BDEB28A0FB4D11A61F25F26C91227B2254BE5F4AA0
                                                                                                                                                                                          SHA-512:9AB1462CDBD7F13F0CECDCCC2D91A85D8C0576B71508F935D26638C25ED023CF8FF4BA4FFDA402B308E6142B135D1B9D88700A519DBE2381E8E945329A5354F7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Prague) {.. {-9223372036854775808 3464 0 LMT}.. {-3786829064 3464 0 PMT}.. {-2469401864 3600 0 CET}.. {-1693706400 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-938905200 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-777862800 7200 0 CEST}.. {-765327600 3600 0 CET}.. {-746578800 7200 1 CEST}.. {-733359600 3600 0 CET}.. {-728517600 0 1 GMT}.. {-721260000 0 0 CET}.. {-716425200 7200 1 CEST}.. {-701910000 3600 0 CET}.. {-684975600 7200 1 CEST}.. {-670460400 3600 0 CET}.. {-654217200 7200 1 CEST}.. {-639010800 3600 0 CET}.. {283993200 3600 0 CET}.. {291776400 7200 1 CEST}.. {307501200 3600 0 CET}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7658
                                                                                                                                                                                          Entropy (8bit):3.7750218768791806
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:eq+cEpkjXkSV385aNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBK0:ePWjUS7ivBeRF+W35Syrwl9h5j
                                                                                                                                                                                          MD5:0D3C919F60081388524BD5DB22E6904B
                                                                                                                                                                                          SHA1:6691EAB901C8B57D2F2693120A45A67799D05FCB
                                                                                                                                                                                          SHA-256:8B64A42BAFD90F9255CACFDBAC603D638DD7C18DC27249F9C9B515E1DA634424
                                                                                                                                                                                          SHA-512:62A2820B8C1C5468AC1F1BB626F9AAAD0BA1DEC5B73740F00FE4DB8CFA3F2BCF9947968E693824FC8770BA20AB962F93F7E5E345AE8A85F99CDB18E2B510308E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Riga) {.. {-9223372036854775808 5794 0 LMT}.. {-2840146594 5794 0 RMT}.. {-1632008194 9394 1 LST}.. {-1618702594 5794 0 RMT}.. {-1601681794 9394 1 LST}.. {-1597275394 5794 0 RMT}.. {-1377308194 7200 0 EET}.. {-928029600 10800 0 MSK}.. {-899521200 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-795834000 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10800 0 MSK}.. {6
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8813
                                                                                                                                                                                          Entropy (8bit):3.8168470239811736
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:hhGvC2GmkNXEq74elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhn:hUsF41sFpM5vwA6Efv03TBZLl
                                                                                                                                                                                          MD5:C4F49446D3696301EDB339691DCB2FDB
                                                                                                                                                                                          SHA1:537963A77B9BE9BE6B997A812A6E6DD120F6F247
                                                                                                                                                                                          SHA-256:DCD2D9144507311E573568598E1FFD0E0574FB677AA0DAFC5641D80A19EB6E58
                                                                                                                                                                                          SHA-512:1F0A9A549FA0995C51E90AC392671E3F09744B268F1EE6A27CA7E3C41C2B02A4BA0F98369BE40BA482FBA1FED8F1EE712F0B3217AD86164D1AD498E369C24D76
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Rome) {.. {-9223372036854775808 2996 0 LMT}.. {-3252098996 2996 0 RMT}.. {-2403565200 3600 0 CET}.. {-1690765200 7200 1 CEST}.. {-1680487200 3600 0 CET}.. {-1664758800 7200 1 CEST}.. {-1648951200 3600 0 CET}.. {-1635123600 7200 1 CEST}.. {-1616896800 3600 0 CET}.. {-1604278800 7200 1 CEST}.. {-1585533600 3600 0 CET}.. {-1571014800 7200 1 CEST}.. {-1555293600 3600 0 CET}.. {-932432400 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-830307600 7200 0 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-807152400 7200 0 CEST}.. {-798073200 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-766717200 3600 0 CET}.. {-750898800 7200 1 CEST}.. {-733359600 3600 0 CET}.. {-719456400 7200 1 CEST}.. {-701917200 3600 0 CET}.. {-689209200 7200 1 CEST}.. {-670460400 3600 0 CET}.. {-114051600 7200 1 CEST}.. {-103168800 36
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2118
                                                                                                                                                                                          Entropy (8bit):3.664269700453612
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:7PvCAs6kKR6aQmF1cSNWrI+AjQnTRYZ/YF0LUdt/LkajuZbIJltiabs2Tb:7HCAs6kC6aZF1cSN4I+AjQTRYZ/YF0Lw
                                                                                                                                                                                          MD5:965D987F6576F66A08871697144D4CDB
                                                                                                                                                                                          SHA1:AF7226DF81C2B3C3A5832F59FC708A6BCBF389CA
                                                                                                                                                                                          SHA-256:8F395352AA05D35E7D13380E73659A0D5B56FFC17E3F4E40E4F678A902F0E49B
                                                                                                                                                                                          SHA-512:B82E0CFA5EDA0FCDF03609AE439255F8937A7E9EFA0AFE15EA8877316782AFC74514BCD2B4F06F1B5F0F3C5A64A933D73CB50D5AED2BB1491BD6CACBB77B10E8
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Samara) {.. {-9223372036854775808 12020 0 LMT}.. {-1593820800 10800 0 +03}.. {-1247540400 14400 0 +04}.. {-1102305600 14400 0 +05}.. {354916800 18000 1 +05}.. {370724400 14400 0 +04}.. {386452800 18000 1 +05}.. {402260400 14400 0 +04}.. {417988800 18000 1 +05}.. {433796400 14400 0 +04}.. {449611200 18000 1 +05}.. {465343200 14400 0 +04}.. {481068000 18000 1 +05}.. {496792800 14400 0 +04}.. {512517600 18000 1 +05}.. {528242400 14400 0 +04}.. {543967200 18000 1 +05}.. {559692000 14400 0 +04}.. {575416800 18000 1 +05}.. {591141600 14400 0 +04}.. {606866400 10800 0 +04}.. {606870000 14400 1 +04}.. {622594800 10800 0 +03}.. {638319600 14400 1 +04}.. {654649200 10800 0 +03}.. {670374000 7200 0 +03}.. {670377600 10800 1 +03}.. {686102400 10800 0 +03}.. {687916800 14400 0 +04}.. {701820000 18000 1 +05}.. {717544800 14400 0 +04}.. {733
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):179
                                                                                                                                                                                          Entropy (8bit):4.955758257767983
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVvjF3vXHAIgoqspvVHRL/yQawELDX7x/yQaxE:SlSWB9vsM3ymx5PHAIgoxvN/yt/yrE
                                                                                                                                                                                          MD5:D253DA6880630A31D39DB0CFA4933ABD
                                                                                                                                                                                          SHA1:E5798DAAE574729685FE489F296B964BC1CCF2E4
                                                                                                                                                                                          SHA-256:B6856A0E38C2404F7D5FA1821559503F8AE70923A562F0D993124D131515F395
                                                                                                                                                                                          SHA-512:CFB6005F3E8D1C585AF36EB7A8C9F49760EF6F446C97E7804EB61EFD0804424C4FB6AE81B71C5A867274EF89A17DAC0D2A0FF882A0F6AEA1D5FFD51593726C5F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Rome)]} {.. LoadTimeZoneFile Europe/Rome..}..set TZData(:Europe/San_Marino) $TZData(:Europe/Rome)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):189
                                                                                                                                                                                          Entropy (8bit):4.937834327554967
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV/sUE2tovXHAIgoq8sUE2oAovRL/yQawEX3GEaQa5:SlSWB9vsM3ymhrE2tSHAIgohrE2LovNZ
                                                                                                                                                                                          MD5:F7C7DAE9C5D371EF9EE1F490246ED3CC
                                                                                                                                                                                          SHA1:40C388FE2A55078C8E0524A4385B3F8846960E24
                                                                                                                                                                                          SHA-256:BC00D953C2F3E55E40EDA13838AB66B9E9D0BDAD620E4EB917637761ABB06FB1
                                                                                                                                                                                          SHA-512:EB22C59F4D58D96797A718FC59B010795F587626E456D44A3E6398E0FBF4ECD97BCDC151BC1359151798B5AF2964FE5708233F8ECD0D344C3E27629F2645687F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Belgrade)]} {.. LoadTimeZoneFile Europe/Belgrade..}..set TZData(:Europe/Sarajevo) $TZData(:Europe/Belgrade)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2061
                                                                                                                                                                                          Entropy (8bit):3.6638125261109824
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:yFvCAs6kKR6aQmF1cSNWJjXgV/Ap40FjDQ:yhCAs6kC6aZF1cSNcjXgV/ApDFjDQ
                                                                                                                                                                                          MD5:CC4D7C478790588D232568CAB12D8E67
                                                                                                                                                                                          SHA1:07A7CFCFFFF91D124EDFC99F5053BAFC79FBB12B
                                                                                                                                                                                          SHA-256:AB90363DEE5077C39EC55FE8E519593FF08223E5A8E593F6CCE01FB5B8B35BAE
                                                                                                                                                                                          SHA-512:23944D20624C942CFDE58F1019160D64401BD0AFB8C3EC49F904038482FAA6741812548C860A2DAE050B8D17A7E08ED9C6EBE7FF19393CFA46D78B1D21B1CACA
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Saratov) {.. {-9223372036854775808 11058 0 LMT}.. {-1593820800 10800 0 +03}.. {-1247540400 14400 0 +05}.. {354916800 18000 1 +05}.. {370724400 14400 0 +04}.. {386452800 18000 1 +05}.. {402260400 14400 0 +04}.. {417988800 18000 1 +05}.. {433796400 14400 0 +04}.. {449611200 18000 1 +05}.. {465343200 14400 0 +04}.. {481068000 18000 1 +05}.. {496792800 14400 0 +04}.. {512517600 18000 1 +05}.. {528242400 14400 0 +04}.. {543967200 18000 1 +05}.. {559692000 14400 0 +04}.. {575416800 10800 0 +04}.. {575420400 14400 1 +04}.. {591145200 10800 0 +03}.. {606870000 14400 1 +04}.. {622594800 10800 0 +03}.. {638319600 14400 1 +04}.. {654649200 10800 0 +03}.. {670374000 14400 0 +04}.. {701820000 10800 0 +04}.. {701823600 14400 1 +04}.. {717548400 10800 0 +03}.. {733273200 14400 1 +04}.. {748998000 10800 0 +03}.. {764722800 14400 1 +04}.. {780
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2389
                                                                                                                                                                                          Entropy (8bit):3.9502615086649637
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:wM2wE0xhuHJkN+2kCnbdSisa0ewEKGfUslIYtq8X:UwEAEpkuCgaNl7
                                                                                                                                                                                          MD5:1953A171614196D2FD2CA12FFE6F70D4
                                                                                                                                                                                          SHA1:20958D5888F94C1FF2C90DDB97915435095AA67C
                                                                                                                                                                                          SHA-256:4186A873A6218FF746957A0AAED1D61FC28FF5ED6D44BF38F36B5120A21C06C6
                                                                                                                                                                                          SHA-512:35A628EBB2C2068A7DE07175494E195D75ADE30CB4B8BFE7EE7EA0A3B30F68BF6E0F21590A0A2DA0E02B944473545A5887BF95692A9C9E9DCD08CB8D542D142B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Simferopol) {.. {-9223372036854775808 8184 0 LMT}.. {-2840148984 8160 0 SMT}.. {-1441160160 7200 0 EET}.. {-1247536800 10800 0 MSK}.. {-888894000 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-811645200 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10800 0 MSK}.. {606870000 14400 1 MSD}.. {622594800 10800 0 MSK}.. {631141200 10800 0 MSK}.. {646786800 7200 0 EET}.. {694216800 7200 0 EET}.. {
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):187
                                                                                                                                                                                          Entropy (8bit):4.953089768975736
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV/sUE2tovXHAIgoq8sUE2oAovRL/yQawOgpr8Qahr:SlSWB9vsM3ymhrE2tSHAIgohrE2LovNO
                                                                                                                                                                                          MD5:0BF8ADBB63F5D6187C75FF1B0BAC761E
                                                                                                                                                                                          SHA1:7DE15E767D34812F784CE6E85438A592E2CBA418
                                                                                                                                                                                          SHA-256:52F20858433261B15797B64F0A09CEE95D552EF93B5DAA7C141BFAB6D718C345
                                                                                                                                                                                          SHA-512:27D395635427C8FA1A4E0063A32F482701D2CC7C7724B4A06E661D4A419D23E219672888D37367FE5E70B6872914EB9EE034AE359DCB6A4C4CE05CA34C3589A9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Belgrade)]} {.. LoadTimeZoneFile Europe/Belgrade..}..set TZData(:Europe/Skopje) $TZData(:Europe/Belgrade)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7654
                                                                                                                                                                                          Entropy (8bit):3.727428614069594
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:8lmG4+K7Gjz5CXNUatpaNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYf:8lmGWwkdUasivBeRF+W35Syrwl9h5j
                                                                                                                                                                                          MD5:91357DFC23ADB0CE80C463E4B6D896BE
                                                                                                                                                                                          SHA1:273F51BE4C67A9AC1182F86AC060E963684151D5
                                                                                                                                                                                          SHA-256:6415F279CB143EA598CF8272263AC5B502827B10CEEB242B39E6EFCC23A2EE12
                                                                                                                                                                                          SHA-512:8EA7E2D4C2239879A4D6CCE302C38A6D2A9093A2CADEF4F4294E60D373AB9A2C468BA6E3D54DEC7F73D954CE5226EF2B022F8BDEF29B3B4AAB3838B05C72EA29
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Sofia) {.. {-9223372036854775808 5596 0 LMT}.. {-2840146396 7016 0 IMT}.. {-2369527016 7200 0 EET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-788922000 3600 0 CET}.. {-781048800 7200 0 EET}.. {291762000 10800 0 EEST}.. {307576800 7200 0 EET}.. {323816400 10800 1 EEST}.. {339026400 7200 0 EET}.. {355266000 10800 1 EEST}.. {370393200 7200 0 EET}.. {386715600 10800 1 EEST}.. {401846400 7200 0 EET}.. {417571200 10800 1 EEST}.. {433296000 7200 0 EET}.. {449020800 10800 1 EEST}.. {465350400 7200 0 EET}.. {481075200 10800 1 EEST}.. {496800000 7200 0 EET}.. {512524800 10800 1 EEST}.. {528249600 7200 0 EET}.. {543974400 10800 1 EEST}.. {559699200 7200 0 EET}.. {575424000 10800 1 EEST}.. {591148800 7200 0 EET}.. {606873600 10800 1 EEST}.. {62259
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7308
                                                                                                                                                                                          Entropy (8bit):3.817544865319589
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:Skhe74elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxOrnW+:Sky41sFpM5vwA6Efv03TBZLl
                                                                                                                                                                                          MD5:A17318A055D4BB049FB4621CDC2AFED3
                                                                                                                                                                                          SHA1:61BA62F253BD4D8B34C2CFCDB96AB458D413E214
                                                                                                                                                                                          SHA-256:12447CE016745FC14584CB5F753E918C23ECA5D028CA50042E0714CF3783608A
                                                                                                                                                                                          SHA-512:90CF037C1DBF55C5D70164D2B2CBDC9580F7FE496279416F578E42A444AD6CEBFF29336921619AAFC4E872B886A9AC5EF45006D2B9585D17AA3864F773C89610
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Stockholm) {.. {-9223372036854775808 4332 0 LMT}.. {-2871681132 3614 0 SET}.. {-2208992414 3600 0 CET}.. {-1692496800 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {315529200 3600 0 CET}.. {323830800 7200 1 CEST}.. {338950800 3600 0 CET}.. {354675600 7200 1 CEST}.. {370400400 3600 0 CET}.. {386125200 7200 1 CEST}.. {401850000 3600 0 CET}.. {417574800 7200 1 CEST}.. {433299600 3600 0 CET}.. {449024400 7200 1 CEST}.. {465354000 3600 0 CET}.. {481078800 7200 1 CEST}.. {496803600 3600 0 CET}.. {512528400 7200 1 CEST}.. {528253200 3600 0 CET}.. {543978000 7200 1 CEST}.. {559702800 3600 0 CET}.. {575427600 7200 1 CEST}.. {591152400 3600 0 CET}.. {606877200 7200 1 CEST}.. {622602000 3600 0 CET}.. {638326800 7200 1 CEST}.. {654656400 3600 0 CET}.. {670381200 7200 1 CEST}.. {686106000 3600 0 CET}.. {701830800 7200 1 CEST}.. {717555600 3600
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7549
                                                                                                                                                                                          Entropy (8bit):3.76585669030767
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:dUusEpkjXkSV3AMaNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBK0:O0WjUSWivBeRF+W35Syrwl9h5j
                                                                                                                                                                                          MD5:54EF0224F5E28FA78F212EC97D4AE561
                                                                                                                                                                                          SHA1:FA7C9A951ED943F1E1E609D2253582016BC26B57
                                                                                                                                                                                          SHA-256:6F3594CCDA78B02B2EE14C8FAE29E668E47193AF2DFCF5AF1ECD210F13BCE9CE
                                                                                                                                                                                          SHA-512:2D1CA2BB1945AE5E3F56AF8FA7F950CE7169F215C783E683634581C5EC01B54159E47A0E9551897077BBEAB06158906029A4E4B0051A263D9E5D903EA9DA1692
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Tallinn) {.. {-9223372036854775808 5940 0 LMT}.. {-2840146740 5940 0 TMT}.. {-1638322740 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-1593824400 5940 0 TMT}.. {-1535938740 7200 0 EET}.. {-927943200 10800 0 MSK}.. {-892954800 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-797648400 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10800 0 MSK}.. {606870000 10800 1 EEST}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7675
                                                                                                                                                                                          Entropy (8bit):3.809498345470167
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:n05NWKIHBJ9AE4elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhlt:0iKqxAE41sFpM5vwA6Efv03TBZLl
                                                                                                                                                                                          MD5:1983B88075A92942209BB2B80E565F4E
                                                                                                                                                                                          SHA1:12A0401026C5C036144FD1D544173AAB39969F61
                                                                                                                                                                                          SHA-256:C62686BF598138FEFB72E8CC6632BA75A5FE147F2A30124EE3583BE1F732E38D
                                                                                                                                                                                          SHA-512:E95C38FA0A2B526C00B9DCF5CDF53059DECF64B085AA18BE000968DA626561944415D053CF7A5C32BC672085538920CFD67A3A3B627CFD5B1A4C9CEC49AA3F96
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Tirane) {.. {-9223372036854775808 4760 0 LMT}.. {-1767230360 3600 0 CET}.. {-932346000 7200 0 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-843519600 3600 0 CET}.. {136854000 7200 1 CEST}.. {149896800 3600 0 CET}.. {168130800 7200 1 CEST}.. {181432800 3600 0 CET}.. {199839600 7200 1 CEST}.. {213141600 3600 0 CET}.. {231894000 7200 1 CEST}.. {244591200 3600 0 CET}.. {263257200 7200 1 CEST}.. {276040800 3600 0 CET}.. {294706800 7200 1 CEST}.. {307490400 3600 0 CET}.. {326156400 7200 1 CEST}.. {339458400 3600 0 CET}.. {357087600 7200 1 CEST}.. {370389600 3600 0 CET}.. {389142000 7200 1 CEST}.. {402444000 3600 0 CET}.. {419468400 7200 1 CEST}.. {433807200 3600 0 CET}.. {449622000 7200 1 CEST}.. {457480800 7200 0 CEST}.. {465354000 3600 0 CET}.. {481078800 7200 1 CEST}.. {496803600 3600 0 CET}.. {512528400 7200 1 C
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):189
                                                                                                                                                                                          Entropy (8bit):4.906212162381389
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV+NM/LWXHAIgoq9NM/HARL/yQa3MPgJM1p8QagNMj:SlSWB9vsM3ymI6CHAIgoI6HAN/ytM4MO
                                                                                                                                                                                          MD5:E0C99DB7673EEE440BA1848046455BA1
                                                                                                                                                                                          SHA1:1BCCC1BE46306DEF8A9CA249DE8FA11FC57CC04D
                                                                                                                                                                                          SHA-256:FDD53FDB5F754BBBA8FF98F0B1555FE0BAEB7852843220A7CF93A190B641A9AD
                                                                                                                                                                                          SHA-512:CD56B540AE9084DEAA9D0A1DBBAF89733C465424C22CE74696B9AE90FD4FEFAB265CF23C5B13A7F04597D75FD0147BD593E0552B56D87372170CB4CA1BFC8259
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Chisinau)]} {.. LoadTimeZoneFile Europe/Chisinau..}..set TZData(:Europe/Tiraspol) $TZData(:Europe/Chisinau)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2119
                                                                                                                                                                                          Entropy (8bit):3.680951255407528
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:kFvCAs6kKR6aQmF1cSNWrI+AjQndgV/Ap40FjDOP:khCAs6kC6aZF1cSN4I+AjQdgV/ApDFj4
                                                                                                                                                                                          MD5:83C86E437B5FBA1DC9CC5235396AC381
                                                                                                                                                                                          SHA1:5493A59C3A5A1B55ACD493E67F9E29D2A415A8DB
                                                                                                                                                                                          SHA-256:9FA9D09509B4F8F5A9C8E422DBA02605070C3EBDAEB7C1DF8527C8EEF5E3632D
                                                                                                                                                                                          SHA-512:86222489C65C87646939DECF91C2EC336EB46F64B644526A3FA8A4854B9D11819F6FD253107AB8A3DE911E254C88092D25137442164A6E437CDAF258A7CBB66C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Ulyanovsk) {.. {-9223372036854775808 11616 0 LMT}.. {-1593820800 10800 0 +03}.. {-1247540400 14400 0 +05}.. {354916800 18000 1 +05}.. {370724400 14400 0 +04}.. {386452800 18000 1 +05}.. {402260400 14400 0 +04}.. {417988800 18000 1 +05}.. {433796400 14400 0 +04}.. {449611200 18000 1 +05}.. {465343200 14400 0 +04}.. {481068000 18000 1 +05}.. {496792800 14400 0 +04}.. {512517600 18000 1 +05}.. {528242400 14400 0 +04}.. {543967200 18000 1 +05}.. {559692000 14400 0 +04}.. {575416800 18000 1 +05}.. {591141600 14400 0 +04}.. {606866400 10800 0 +04}.. {606870000 14400 1 +04}.. {622594800 10800 0 +03}.. {638319600 14400 1 +04}.. {654649200 10800 0 +03}.. {670374000 7200 0 +03}.. {670377600 10800 1 +03}.. {686102400 7200 0 +02}.. {695779200 10800 0 +04}.. {701823600 14400 1 +04}.. {717548400 10800 0 +03}.. {733273200 14400 1 +04}.. {748
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7541
                                                                                                                                                                                          Entropy (8bit):3.769633712898356
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:dpSlo5Epkn/paNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBKb0hH:dpUWnmivBeRF+W35Syrwl9h5j
                                                                                                                                                                                          MD5:4AD237C8A1D94E2CB70377C49867AC76
                                                                                                                                                                                          SHA1:121303331223925BFB708918BAED3CD2F0E33C60
                                                                                                                                                                                          SHA-256:747F543B7A875214F8EEBFDAE3182D91B1E93CEB57B58D2B7657672F949B13A9
                                                                                                                                                                                          SHA-512:FD2FB930CB81BD3427AEF374ACAC2A120F6AD447625824AD6D08E68868A3B389FDDE7E2A82FCFF3490488601ADE646AC989AA7CEF1FE77A700E232D7561B6E74
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Uzhgorod) {.. {-9223372036854775808 5352 0 LMT}.. {-2500939752 3600 0 CET}.. {-946774800 3600 0 CET}.. {-938905200 7200 1 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796870800 7200 1 CEST}.. {-794714400 3600 0 CET}.. {-773456400 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10800 0 MSK}.. {606870000 14400 1 MSD}.. {622594800 10800 0 MSK}.. {631141200 10800 0 MSK}.. {646786800 3600 0 CET}.. {67
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):180
                                                                                                                                                                                          Entropy (8bit):4.953146873643623
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVnCMPfXHAIgoqkCM4ARL/yQa1NEHp8Qa5CMS:SlSWB9vsM3ym5XPHAIgo5gAN/yvNEJ8G
                                                                                                                                                                                          MD5:A0BAEC8B6AF1589ECBE52667DDB2A153
                                                                                                                                                                                          SHA1:37093F4F885CBFA90A1F136D082E8B7546244ACC
                                                                                                                                                                                          SHA-256:06B235BF047FC2303102BC3DC609A5754A6103321D28440B74EEC1C9E3D24642
                                                                                                                                                                                          SHA-512:DBEC235AFB413FA8D116FA1AFFE73706762E7458038B6D68E0BFD71C339510D766825BA97055A06DEE14D5880EAE6CD035BFE0C935C0DF44B0107A356D293A78
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Zurich)]} {.. LoadTimeZoneFile Europe/Zurich..}..set TZData(:Europe/Vaduz) $TZData(:Europe/Zurich)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):176
                                                                                                                                                                                          Entropy (8bit):4.914414313741477
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVvjF3vXHAIgoqspvVHRL/yQa1xLM1p8QaxE:SlSWB9vsM3ymx5PHAIgoxvN/yvN+8rE
                                                                                                                                                                                          MD5:2404265F8DE1F7D7745893DD4752BA1C
                                                                                                                                                                                          SHA1:C07E7F72DBDC7F5F746385523EA733C2714F5DA2
                                                                                                                                                                                          SHA-256:C203E94465BD1D91018FC7670437226EF9A4BB41D59DDE49095363865CA33D00
                                                                                                                                                                                          SHA-512:5C20834542B74041AAB1DBE35686781B32EEB5814B1A35A942E87D1FC3B6D8F9264CB90433C44A480EA86DDEA65D8C152F41CE3E983C1DE5FA74D6FB5208F701
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Rome)]} {.. LoadTimeZoneFile Europe/Rome..}..set TZData(:Europe/Vatican) $TZData(:Europe/Rome)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7930
                                                                                                                                                                                          Entropy (8bit):3.8193566380830273
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:8F6zq+gH74elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxo:8ozE41sFpM5vwA6Efv03TBZLl
                                                                                                                                                                                          MD5:6A3A8055DD67174E853C7A208BABAC9B
                                                                                                                                                                                          SHA1:64445543DE9D6C01FA858442976E249E37BE23EF
                                                                                                                                                                                          SHA-256:A8165313C9B51DAEF130401439CBA60DAA9887FC5EAA61A5AFD4F7BAD1AD934F
                                                                                                                                                                                          SHA-512:4407B9E8709A8DD05337A10030895AA9876EAF64EF5347952249EE2A541E304331B46D38532FD7CDFF9E633BF8C9884282F0A5ED259EBA1D99DC0914AF1A50C6
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Vienna) {.. {-9223372036854775808 3921 0 LMT}.. {-2422055121 3600 0 CET}.. {-1693706400 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618700400 3600 0 CET}.. {-1577926800 3600 0 CET}.. {-1569711600 7200 1 CEST}.. {-1555801200 3600 0 CET}.. {-938905200 7200 0 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796777200 3600 0 CET}.. {-781052400 7200 1 CEST}.. {-780188400 3600 0 CET}.. {-757386000 3600 0 CET}.. {-748479600 7200 1 CEST}.. {-733273200 3600 0 CET}.. {-717634800 7200 1 CEST}.. {-701910000 3600 0 CET}.. {-684975600 7200 1 CEST}.. {-670460400 3600 0 CET}.. {323823600 7200 1 CEST}.. {338940000 3600 0 CET}.. {347151600 3600 0 CET}.. {354675600 7200 1 CEST}.. {370400400 3600 0 CE
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7485
                                                                                                                                                                                          Entropy (8bit):3.7711709848169592
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:FAhEpkwCXkSV3A/PplKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBK0:FfWHUSKivBeRF+W35Syrwl9h5j
                                                                                                                                                                                          MD5:1AB5FCEACC4E09074BA9F72F0B7747D5
                                                                                                                                                                                          SHA1:E0134E61EC0ADC60BF6DB4544EA7B7FFA4EC7857
                                                                                                                                                                                          SHA-256:B762DB4A068DC79FA57691E070D7026086E5A6D2FC273D5C1872E7C8E3711533
                                                                                                                                                                                          SHA-512:07565071D05CF972DD64F6060599EB68A00BF264172873BA310168AD07CE0CFCF90D0019B775433EC910DA748B89F0C614E7FD4E821993DA53C7E33F194C6A97
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Vilnius) {.. {-9223372036854775808 6076 0 LMT}.. {-2840146876 5040 0 WMT}.. {-1672536240 5736 0 KMT}.. {-1585100136 3600 0 CET}.. {-1561251600 7200 0 EET}.. {-1553565600 3600 0 CET}.. {-928198800 10800 0 MSK}.. {-900126000 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-802141200 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10800 0 MSK}.. {606870000 7200 0 EEMMTT}.. {606873600 10800 1 EEST}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2123
                                                                                                                                                                                          Entropy (8bit):3.667144931158014
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:menvCAs6kKR6aQmF1cSNWJjXgV/Ap40FjDqR:mevCAs6kC6aZF1cSNcjXgV/ApDFjDqR
                                                                                                                                                                                          MD5:53E5BA5747B3255BB049F6FF651CEE25
                                                                                                                                                                                          SHA1:A69E2BFDB89AC8756E1CD2EAA9109ACD924A0850
                                                                                                                                                                                          SHA-256:22968D40DAC2B669E6D2BC43ED6B16C8A9CA3E1F9DACBF8B246299C3C24CC397
                                                                                                                                                                                          SHA-512:3269D20DF9C9DDFF8252F33ED563B118771FC71049542DA7C6678E0B5B75FFEA00845FA6F3BC26EDABB4BB7CE449B0B7E00B72473D8D95F126AB3893A9A969B4
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Volgograd) {.. {-9223372036854775808 10660 0 LMT}.. {-1577761060 10800 0 +03}.. {-1247540400 14400 0 +04}.. {-256881600 14400 0 +05}.. {354916800 18000 1 +05}.. {370724400 14400 0 +04}.. {386452800 18000 1 +05}.. {402260400 14400 0 +04}.. {417988800 18000 1 +05}.. {433796400 14400 0 +04}.. {449611200 18000 1 +05}.. {465343200 14400 0 +04}.. {481068000 18000 1 +05}.. {496792800 14400 0 +04}.. {512517600 18000 1 +05}.. {528242400 14400 0 +04}.. {543967200 18000 1 +05}.. {559692000 14400 0 +04}.. {575416800 10800 0 +04}.. {575420400 14400 1 +04}.. {591145200 10800 0 +03}.. {606870000 14400 1 +04}.. {622594800 10800 0 +03}.. {638319600 14400 1 +04}.. {654649200 10800 0 +03}.. {670374000 14400 0 +04}.. {701820000 10800 0 +04}.. {701823600 14400 1 +04}.. {717548400 10800 0 +03}.. {733273200 14400 1 +04}.. {748998000 10800 0 +03}.. {
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8662
                                                                                                                                                                                          Entropy (8bit):3.8187545871488995
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:ELn9M9Nivtctwwoy4qelPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCso:E6Nivtctgq1sFpM5vwA6Efv03TBZLl
                                                                                                                                                                                          MD5:992C1D268E336AF1FB8200966C111644
                                                                                                                                                                                          SHA1:C893B82224C8EF282DB2E16A5BBCC3A21C49B6FE
                                                                                                                                                                                          SHA-256:F9DC10EC2AE2CC810A6C08837059B34BE651900BA4E1CEDB93C209972CCFB5A2
                                                                                                                                                                                          SHA-512:EC4E0D8684D57FA66144F11D8E8C80E5272D4A7304300FEBE20E236476C1B8B33BBC5E479BF96D9ED12900FE6D41DD1DC0D11CBE02B89E0C4C7A153B4BFBCB1F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Warsaw) {.. {-9223372036854775808 5040 0 LMT}.. {-2840145840 5040 0 WMT}.. {-1717032240 3600 0 CET}.. {-1693706400 7200 1 CEST}.. {-1680483600 3600 0 CET}.. {-1663455600 7200 1 CEST}.. {-1650150000 3600 0 CET}.. {-1632006000 7200 1 CEST}.. {-1618696800 7200 0 EET}.. {-1600473600 10800 1 EEST}.. {-1587168000 7200 0 EET}.. {-931734000 7200 0 CEST}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-812502000 7200 1 CEST}.. {-796870800 7200 0 CEST}.. {-796608000 3600 0 CET}.. {-778726800 7200 1 CEST}.. {-762660000 3600 0 CET}.. {-748486800 7200 1 CEST}.. {-733273200 3600 0 CET}.. {-715215600 7200 1 CEST}.. {-701910000 3600 0 CET}.. {-684975600 7200 1 CEST}.. {-670460400 3600 0 CET}.. {-654130800 7200 1 CEST}.. {-639010800 3600 0 CET}.. {-397094400 7200 1 CEST}.. {-386812800 3600 0 CET}.. {-371088000 72
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):187
                                                                                                                                                                                          Entropy (8bit):4.899266605519742
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV/sUE2tovXHAIgoq8sUE2oAovRL/yQa5rXv1/h8Q0:SlSWB9vsM3ymhrE2tSHAIgohrE2LovNB
                                                                                                                                                                                          MD5:B07D9D3A5B0D11A578F77995A5FBE12B
                                                                                                                                                                                          SHA1:1C4E186F2D53C0A1E6A82A6D33B172E403A41D6D
                                                                                                                                                                                          SHA-256:A49B3894EB84F003EB357647D6A40CEAF6213523196CC1EC24EEFD7D9D6D3C3E
                                                                                                                                                                                          SHA-512:43520AE325980B236C47C866620D1DA200AC0CD794E8EB642D2936D4B0ECEFE2DA0A93C9559D08581B3CCE2BC75251A4D5B967D376B16EB0C042B0ADCE1DCD01
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Belgrade)]} {.. LoadTimeZoneFile Europe/Belgrade..}..set TZData(:Europe/Zagreb) $TZData(:Europe/Belgrade)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7490
                                                                                                                                                                                          Entropy (8bit):3.767302554706298
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:rnziEpkvV5lpaNlKkUpvBeRF+iDlKSdkwSMTHkB2vwz59F06Kgr/y/rYjlBKb0hH:rhWd50ivBeRF+W35Syrwl9h5j
                                                                                                                                                                                          MD5:CC195C2ED7DEE40A4A42C6CCF64E4DB6
                                                                                                                                                                                          SHA1:34DC86891FBAAAE0FF328D4896566C777CDF1075
                                                                                                                                                                                          SHA-256:F0045F64F64A2C40088F2960616AB8E0AABB8D6309F489FEE842056FB8412F72
                                                                                                                                                                                          SHA-512:8F58C8023260B5BBA51EE05811F33A2315A79996C900F04069372114EF3B1AB593CE7155288B8699BF2B2E9B284FE5109827B3FC8644012DB54D039E73F2B8EA
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Zaporozhye) {.. {-9223372036854775808 8440 0 LMT}.. {-2840149240 8400 0 +0220}.. {-1441160400 7200 0 EET}.. {-1247536800 10800 0 MSK}.. {-894769200 3600 0 CET}.. {-857257200 3600 0 CET}.. {-844556400 7200 1 CEST}.. {-828226800 3600 0 CET}.. {-826419600 10800 0 MSD}.. {354920400 14400 1 MSD}.. {370728000 10800 0 MSK}.. {386456400 14400 1 MSD}.. {402264000 10800 0 MSK}.. {417992400 14400 1 MSD}.. {433800000 10800 0 MSK}.. {449614800 14400 1 MSD}.. {465346800 10800 0 MSK}.. {481071600 14400 1 MSD}.. {496796400 10800 0 MSK}.. {512521200 14400 1 MSD}.. {528246000 10800 0 MSK}.. {543970800 14400 1 MSD}.. {559695600 10800 0 MSK}.. {575420400 14400 1 MSD}.. {591145200 10800 0 MSK}.. {606870000 14400 1 MSD}.. {622594800 10800 0 MSK}.. {638319600 14400 1 MSD}.. {654649200 10800 0 MSK}.. {670374000 10800 0 EEST}.. {686091600 7200 0 EET}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7305
                                                                                                                                                                                          Entropy (8bit):3.8199799674700277
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:94hH74elPiIEtzsFpMbFNBwA3ybuNTjrjBDmE0DmiTcoYdNOMCsyZhltlUxOrnW+:9Y41sFpM5vwA6Efv03TBZLl
                                                                                                                                                                                          MD5:EBD66FAEA63E1B90122CC1EB21634ECE
                                                                                                                                                                                          SHA1:C6487BB8AB2A6A72B2170B220F383ADB6B9AC91C
                                                                                                                                                                                          SHA-256:95AFA61E439CA38551306D8FDB11C2788D935C42768D0407C9E4337F105A3E93
                                                                                                                                                                                          SHA-512:25A8D0ED9BBE6BF23A1A76CC6D5378CF4D50544AA22DA97DDCD0673D7A5CCFEFFD81B660A1AEFB254B8BBEA55F6EF734BBBD3F0CB903E0721BE107667CA1E328
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Europe/Zurich) {.. {-9223372036854775808 2048 0 LMT}.. {-3675198848 1786 0 BMT}.. {-2385246586 3600 0 CET}.. {-904435200 7200 1 CEST}.. {-891129600 3600 0 CET}.. {-872985600 7200 1 CEST}.. {-859680000 3600 0 CET}.. {347151600 3600 0 CET}.. {354675600 7200 1 CEST}.. {370400400 3600 0 CET}.. {386125200 7200 1 CEST}.. {401850000 3600 0 CET}.. {417574800 7200 1 CEST}.. {433299600 3600 0 CET}.. {449024400 7200 1 CEST}.. {465354000 3600 0 CET}.. {481078800 7200 1 CEST}.. {496803600 3600 0 CET}.. {512528400 7200 1 CEST}.. {528253200 3600 0 CET}.. {543978000 7200 1 CEST}.. {559702800 3600 0 CET}.. {575427600 7200 1 CEST}.. {591152400 3600 0 CET}.. {606877200 7200 1 CEST}.. {622602000 3600 0 CET}.. {638326800 7200 1 CEST}.. {654656400 3600 0 CET}.. {670381200 7200 1 CEST}.. {686106000 3600 0 CET}.. {701830800 7200 1 CEST}.. {717555600 3600 0
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):170
                                                                                                                                                                                          Entropy (8bit):4.8978035005721265
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVxKL823vXHAIgoqyKL8H6RL/wox6QavKL81n:SlSWB9vsM3ymvKA2PHAIgovKAH6N/wRj
                                                                                                                                                                                          MD5:68667037110E713DB3F51922DDE929FE
                                                                                                                                                                                          SHA1:2EB02BE3FD35F105B59847892A78F1AA21754541
                                                                                                                                                                                          SHA-256:E20D829C605A7C5B2A96B83C3480DF28C964A13381A8BD2C72C2A37295131FA7
                                                                                                                                                                                          SHA-512:3A8CC2EC9E3053283F996CA2C4B422061D47F1D16CA07985CBA2C838DF322C23CC9DD28033646F22EAE0E401781480B9D3AF82A539444166A4DD9B7BCCAE45FE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/London)]} {.. LoadTimeZoneFile Europe/London..}..set TZData(:GB) $TZData(:Europe/London)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):175
                                                                                                                                                                                          Entropy (8bit):4.90874180513438
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVxKL823vXHAIgoqyKL8H6RL/w4b/h8QavKL81n:SlSWB9vsM3ymvKA2PHAIgovKAH6N/w4E
                                                                                                                                                                                          MD5:625520BAAB774520AC54BFB9EDCF9FCA
                                                                                                                                                                                          SHA1:C72F0FD45F448901C6B2E24243175729591B9A54
                                                                                                                                                                                          SHA-256:C9334480D0A970254B6BA6FF22E958DC8DD8BF06288229461A551C7C094C3F1D
                                                                                                                                                                                          SHA-512:1B672218FF9C86168E065A98C3B5F67DAB710D1C2A319E9D6599B397C4B4C00D3721B76C735C8AB04BCB618C1832B07F6CCDAF4266CC0D12A461A3A862D1AEB2
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/London)]} {.. LoadTimeZoneFile Europe/London..}..set TZData(:GB-Eire) $TZData(:Europe/London)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):153
                                                                                                                                                                                          Entropy (8bit):4.867609984313873
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/wZ8RDMovn:SlSWB9vsM3yFXHAIgnvVHN/wZ8RQy
                                                                                                                                                                                          MD5:A01FE6FC260711F0E11C85DC3DE3550A
                                                                                                                                                                                          SHA1:988311B71498591425C63669DC3F802F270B2C44
                                                                                                                                                                                          SHA-256:747C15CDC239855D5380B7A7F47112F2A26C61B0BF300EEB9711E6521550D189
                                                                                                                                                                                          SHA-512:BE4678DCBAE5DBC72865665413206C1909F28BA54F4943257870EFFBA6525457866DED7A985E89F2689C810B314DE4AA2FA3A0A1826A664727F5F7113AA56595
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:GMT) $TZData(:Etc/GMT)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):155
                                                                                                                                                                                          Entropy (8bit):4.917182390229381
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/we7/8RDMovn:SlSWB9vsM3yFXHAIgnvVHN/wI8RQy
                                                                                                                                                                                          MD5:3327B1BF3118AC6AFC02C31DF5B67CD9
                                                                                                                                                                                          SHA1:3932577E66801AD31519B0BB56CCE7B9E36221A9
                                                                                                                                                                                          SHA-256:BE48462CCFBB3AEE19597F082A17C2C5D2FD8BB1C9122245EFAB0A51F8F413B0
                                                                                                                                                                                          SHA-512:53866FD513B039E8203E51FF3434D5736D3A4C4E0A46874D1C99A17115181AF749F0D079C2E14C5B0538D3DFA52B1645C977CD6599DA3EDA57CC7F84EEAB2D06
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:GMT+0) $TZData(:Etc/GMT)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):155
                                                                                                                                                                                          Entropy (8bit):4.904279164422928
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/w4Hp8RDMovn:SlSWB9vsM3yFXHAIgnvVHN/w4J8RQy
                                                                                                                                                                                          MD5:0CFFC5655F031D954BD623CC4C74DC9C
                                                                                                                                                                                          SHA1:CE5E7AD67252F52D7E70719725FF5BE393DD6EF0
                                                                                                                                                                                          SHA-256:944C86F516141DDC3AEC1AE4A963E9769879C48ED12DADDF4ED63A01313ACD00
                                                                                                                                                                                          SHA-512:C7352D1394E8B8AC90CD19EE753D5277259BE5512ADDCAED2A2DEF144762CF20BE7A9FA09AAA1829EE401DD195C2AED8C967A7FF46739236E042AF4298EC84A2
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:GMT-0) $TZData(:Etc/GMT)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):154
                                                                                                                                                                                          Entropy (8bit):4.892526720357546
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/wPHp8RDMovn:SlSWB9vsM3yFXHAIgnvVHN/wvp8RQy
                                                                                                                                                                                          MD5:565B41A5DB28F9FE7D220E9BA39062A4
                                                                                                                                                                                          SHA1:5183689210F07C8A71F880DCE8E5C2CB62CEB17D
                                                                                                                                                                                          SHA-256:54850A5F488205DB01FBB46E2DA9FFF951C4571029EA64D35932DDEA5346DAAF
                                                                                                                                                                                          SHA-512:BD6E5141F06B03D62DCF725E9E48D6AA8ECD6E8E47A4015B25DC3F672392065FFFD80D688C6695324DC105EA528025CF447FA77E6D17E15D438E61DC51879CB7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:GMT0) $TZData(:Etc/GMT)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):159
                                                                                                                                                                                          Entropy (8bit):4.917976058206477
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqSsM4DovXHAIgexovYovHRL/wE+FB5yRDMovn:SlSWB9vsM3yFXHAIgnvVHN/wE6BURQy
                                                                                                                                                                                          MD5:443FA76F107ED438F9571A044B848C6A
                                                                                                                                                                                          SHA1:1CF508429DFC40643B1FAB336A249A3A287D8C7C
                                                                                                                                                                                          SHA-256:9E7A8DAA26CE36E8F7D7F13460915C063EE98E2A4DB276AD9D15CA5C7C06815F
                                                                                                                                                                                          SHA-512:6C0C5FF513A742FBDA349AC3A2581D456701B5348A54ECF38E496DAA1EFC74D937982B6F69F1761CC2FC4B88D9A971EFA2B16096E71EAF002EC5CE4130B533DE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/GMT)]} {.. LoadTimeZoneFile Etc/GMT..}..set TZData(:Greenwich) $TZData(:Etc/GMT)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):111
                                                                                                                                                                                          Entropy (8bit):4.90682088010982
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x//LhdNMXGm2OH1V90v:SlSWB9eg/jJDm2OH1VGv
                                                                                                                                                                                          MD5:79C82A5F8B034E71D0582371E3218DBB
                                                                                                                                                                                          SHA1:1476CE8EA223095094B6D25D171E6319C96669F4
                                                                                                                                                                                          SHA-256:8D710699AF319E0DDB83E9F3A32D07AE8082EA2F7EABBD345EFFFFB0F563062E
                                                                                                                                                                                          SHA-512:ADEE55581D1A158929F09A63B03883ABE9193337DDF225C61AFDBB8A2C7D0BD248ADC4714E0EEFD334826C54C1AFFC8B1E6C2B0D6EF830C3CCA50CC79834F473
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:HST) {.. {-9223372036854775808 -36000 0 HST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):179
                                                                                                                                                                                          Entropy (8bit):4.913328649996328
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8Li0vXHAIgN2qfvRL//XF1p4WFKQyvn:SlSWB9vsM3yW2HAIgAOvN///p4wKlvn
                                                                                                                                                                                          MD5:6A307B229C302B1BAE783C8143809269
                                                                                                                                                                                          SHA1:EA169AF81AD12380A69FB6B7A12479BA8B82878B
                                                                                                                                                                                          SHA-256:359C9C02A9FA3DE10BA48FA0AB47D8D7AFF3B47F950CFAF5EB68F842EA52AB21
                                                                                                                                                                                          SHA-512:505445FD0B3E140384EDC27993923BBF9ACD23A244B0F14D58804BFAA946D0BC4C0D301FBCCB492BAFDA42C8A92F4163FB96F4D75DD7374858D1C66183BEC24B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Hong_Kong)]} {.. LoadTimeZoneFile Asia/Hong_Kong..}..set TZData(:Hongkong) $TZData(:Asia/Hong_Kong)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):190
                                                                                                                                                                                          Entropy (8bit):4.888934660651573
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqLGsA/8rtyXHAIgvMGsA/8rJARL/+GAKyx/2RQqGsAW:SlSWB9vsM3yj6SHAIgv1sAN/+XZx+RQK
                                                                                                                                                                                          MD5:F51C5B80789F65136304CE107E4E60E1
                                                                                                                                                                                          SHA1:3F4690BCCA45C0ADEC184175DEC53730C326733C
                                                                                                                                                                                          SHA-256:E4AB3A08ED590D907F9741D4B8FE27E552B19FE0257F14CE2ED5289D5685974C
                                                                                                                                                                                          SHA-512:9D0BB2D8C9D42C3F7274E0831B4320023069A7DF2069AA5EB6FF1BBBF5781629020BBB70C9ECCC38955FC79A5E2CB3110AB90C21191A6FB421F3195C31FC984C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Atlantic/Reykjavik)]} {.. LoadTimeZoneFile Atlantic/Reykjavik..}..set TZData(:Iceland) $TZData(:Atlantic/Reykjavik)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):190
                                                                                                                                                                                          Entropy (8bit):4.807410166086502
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/+L6EL/liEi2eDcVVMB:SlSWB9vsM3y7VTHAIgNTxcAN/+LzM2eV
                                                                                                                                                                                          MD5:0F20CBF1F7600D05F85D4D90FDAB2465
                                                                                                                                                                                          SHA1:2F3C9479C4F4CD7999B19C07359B89A5FB1B9839
                                                                                                                                                                                          SHA-256:1B1177CE4D59D7CBCAE9B0421EB00AD341ECB299BD15773D4ED077F0F2CE7B38
                                                                                                                                                                                          SHA-512:657341FC2CCD6A4F7B405ABC8E24C651F6FFEFD68EBD6E2086ADF44834DCBF21D1B9D414436E42C8DCE46FFB88116B98C1D073782E214B3996D49EC00DFF4383
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Indian/Antananarivo) $TZData(:Africa/Nairobi)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):180
                                                                                                                                                                                          Entropy (8bit):4.853088038233057
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/+L6EL9WJx3vFNMXGm2OHi/FvoHscfJ7XH0VQVFV6VVFSTVV:SlSWB9eg/+LxWJxPDm2OHqFvoH9+VQV3
                                                                                                                                                                                          MD5:06143C3DFD86B3FE4F2A3060C0E05BB6
                                                                                                                                                                                          SHA1:88E0E30CEE4AB8117860A35AD03B16AF48988789
                                                                                                                                                                                          SHA-256:11044AD7CB0848CC734D2A67128AA6AC07CB89268399AA0A71A99024DE4B8879
                                                                                                                                                                                          SHA-512:79195D3D0D475BEA982F40683D4BA14AC33B3FA91311F513DCED955C9297C2B0F12D94CCA930FAE0FB7F95DB34CD4E74B5AF0233E792122646592B7EFF0F3163
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Indian/Chagos) {.. {-9223372036854775808 17380 0 LMT}.. {-1988167780 18000 0 +05}.. {820436400 21600 0 +06}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):154
                                                                                                                                                                                          Entropy (8bit):4.957836950238227
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/+L6EL9FBIEW3odNMXGm2OHAWMx5oHvTLyvMVSYovV:SlSWB9eg/+LxpW3SDm2OHAnx5oHvTIMI
                                                                                                                                                                                          MD5:DA36A8158AF3480E67CD6EF3ABB875E3
                                                                                                                                                                                          SHA1:9DA259BFB6B39AB0425E67A1E4F1ECAA1321AD72
                                                                                                                                                                                          SHA-256:CB43DEAFAD0F8BF7DE8567841790A58D358EF2B210BB2022686B3EB7F97B2E5B
                                                                                                                                                                                          SHA-512:48B20BFD14B0C756CD3AAA9A422837D7D5012612294EB01EBF12A26D0147D85087DED1B95C3E5CAB1485E8BC3B19A69B9DB234D06562AD0482CB7518977256BE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Indian/Christmas) {.. {-9223372036854775808 25372 0 LMT}.. {-2364102172 25200 0 +07}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):152
                                                                                                                                                                                          Entropy (8bit):4.861380366254495
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/+L6EL9dsFNMXGm2OHGXTvxoeoHvmVUXxXW5d6TW7Ay:SlSWB9eg/+Lx2Dm2OHGXCeoHv3BG5UI9
                                                                                                                                                                                          MD5:4D5285269D6F0A54495B10EEF4994E01
                                                                                                                                                                                          SHA1:FEE44907B02B660390CFDC560E3981112D5774BB
                                                                                                                                                                                          SHA-256:71194B896CC00967EBBE3F9F4609F8C5CD73CE56B2529646A7A6AC679BB03400
                                                                                                                                                                                          SHA-512:068D29EA51465A5232724A0CEF0274FD5DFC16A44720823CEA470125129FF527BF411EDAAFAEBE5F9783334BD93DB92372D0847207E4A42C79A0F6158163F1C8
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Indian/Cocos) {.. {-9223372036854775808 23260 0 LMT}.. {-2209012060 23400 0 +0630}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):184
                                                                                                                                                                                          Entropy (8bit):4.825881690094318
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/+L6EL9TKlBx+DcVVMB:SlSWB9vsM3y7VTHAIgNTxcAN/+LxGV+V
                                                                                                                                                                                          MD5:7EBDFA311C7852AFADF880395071DE48
                                                                                                                                                                                          SHA1:F6EC21FDFB75EC1BE45B1C4170147CBA3E870E7B
                                                                                                                                                                                          SHA-256:53FA58E32DC2E4ABB574B2F78011815EEB7F89F453CC63C6B6C1460ABBB4CA5C
                                                                                                                                                                                          SHA-512:DFBCD4EA4AFFA1D1CAE7308168874527FD36B5CAE76153AADA9C5E5F628258AB26654A16C8A5F8906FC5918398FD880B15B6DD4E3EF6AD3BE63D4A2455701FA8
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Indian/Comoro) $TZData(:Africa/Nairobi)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):149
                                                                                                                                                                                          Entropy (8bit):4.871582172327986
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/+L6EL12h2FNMXGm2OHvavFd9vM0VQVFv:SlSWB9eg/+L53XDm2OHEd1nVQVV
                                                                                                                                                                                          MD5:5D07EBAAF83E8E473C23142CB09A05BF
                                                                                                                                                                                          SHA1:34FD76789085EB6336193889D8FB5A8B3142383E
                                                                                                                                                                                          SHA-256:C7AFDE6978D8CE5413730D370E2776E2ACC7D96570A6034EB504C0F42CA5D1E7
                                                                                                                                                                                          SHA-512:FC5613EFC3B8EFA3553ECD3232383FF4CF5F4D777A1E46C4D212080711EA33F38A59449F828C6E33CB1F359249F254B4869AFD8F434FBD5213E657732D832777
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Indian/Kerguelen) {.. {-9223372036854775808 0 0 -00}.. {-631152000 18000 0 +05}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):149
                                                                                                                                                                                          Entropy (8bit):4.942285614866899
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/+L6ELzJM5FNMXGm2OHuVdF+YoHscfNmHIRNVsRYovV:SlSWB9eg/+L/YDm2OHWgYoH9YHkSN
                                                                                                                                                                                          MD5:ECA9671460E65583ADF4892E40F2402E
                                                                                                                                                                                          SHA1:6E5DE51DD1FB619E33254F5967647A77A5D7C496
                                                                                                                                                                                          SHA-256:8E1D0F7268A5EE75E8A7C17FD6E1A9880BAD18A612346C29D70B462024D7371E
                                                                                                                                                                                          SHA-512:CBD970D789943120B8DE5A166B97ABC7E221F7692DE26FC5523FB0D76C4BF9D10F541778ED1ABB7A3B9529547C20B804B702B7221516970B7B3225A87682AC93
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Indian/Mahe) {.. {-9223372036854775808 13308 0 LMT}.. {-1988163708 14400 0 +04}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):183
                                                                                                                                                                                          Entropy (8bit):4.883092265054605
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/+L6ELzE5FNMXGm2OHnz8eoHvZT5lxV/uUQwGN0VQVFv:SlSWB9eg/+L/EJDm2OHnz8eoHvZT5rdI
                                                                                                                                                                                          MD5:4DF975C040D78FA8F9C92E5565D63A73
                                                                                                                                                                                          SHA1:48488F076871530D32278084F1C9CB90CB1E6AB4
                                                                                                                                                                                          SHA-256:9FAC69DC609CC6074ECD67E0BE8AE62E33D8D9C7F055A3E0DEE1430C7FFC54F6
                                                                                                                                                                                          SHA-512:880B920FB51F48731BA8C741B9583038A3276221C55F1CE0B464D2797D71EF9D22B4E166841BAB0544B7091CE683697BFCA5A4235FF1E6264B0619DBDD4BB619
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Indian/Maldives) {.. {-9223372036854775808 17640 0 LMT}.. {-2840158440 17640 0 MMT}.. {-315636840 18000 0 +05}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):272
                                                                                                                                                                                          Entropy (8bit):4.5144164346164715
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/+L/GDm2OHlNnoH9SvulvSNFF+c0FSFFMVhvSNFFVBjvVFSFFVGlvSN:MB86+L/CmdHlNnCy6qB0FScZq9BjVFSL
                                                                                                                                                                                          MD5:05362B6A17C5F4F4E8CBE5A676D5D0DE
                                                                                                                                                                                          SHA1:84675D5E8D1425A5E9DB07D1BC1E6A5921B5AC91
                                                                                                                                                                                          SHA-256:A2B1B93CBEECBD900ED71E61A4932509EB52688E97A6015DAD067066D0D42072
                                                                                                                                                                                          SHA-512:351D2BC5F5888D8E842BF160D11D57E059811186D63B0413061768C7FE348CECB700748A0C0125F0ABCBB039FC74FF7BEEFDD42088BA1E28C785E545ED2CDF24
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Indian/Mauritius) {.. {-9223372036854775808 13800 0 LMT}.. {-1988164200 14400 0 +04}.. {403041600 18000 1 +04}.. {417034800 14400 0 +04}.. {1224972000 18000 1 +04}.. {1238274000 14400 0 +04}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):185
                                                                                                                                                                                          Entropy (8bit):4.828945679595274
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsVVMMvfXHAIgNGExVMeWARL/+L6ELzO1h4DcVVMMyn:SlSWB9vsM3y7VTHAIgNTxcAN/+L/O1hm
                                                                                                                                                                                          MD5:8ABBEC0E138C1A68CB5D096E822DE75E
                                                                                                                                                                                          SHA1:E9C5CE1A249F6DC0F6EDBB3F5B00F3106E3BD6CA
                                                                                                                                                                                          SHA-256:845C45FD7B6F0604B03A3C72DB117878B568FB537BCA078304727964157B96AB
                                                                                                                                                                                          SHA-512:15790CCA70140D3139F3E2A202DC8F12E68466A367C68458D6A78CDDC7822FB5EDB87D630926B51F3DE48D95DE7CA3FCB946CD7B762FE5B15866DAA9DBA40B46
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Nairobi)]} {.. LoadTimeZoneFile Africa/Nairobi..}..set TZData(:Indian/Mayotte) $TZData(:Africa/Nairobi)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):152
                                                                                                                                                                                          Entropy (8bit):4.978742383555601
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/+L6ELsAcCFNMXGm2OHuU7oeoHsdvcUeNVsRYovV:SlSWB9eg/+LBXDm2OHb7oeoHTfNSN
                                                                                                                                                                                          MD5:A03BEEC3F4CF0F6E1077A04C67CF3375
                                                                                                                                                                                          SHA1:4C39038341E26C2E68F2E46AD243A0955098F149
                                                                                                                                                                                          SHA-256:E039B16CAAB8F5D8F85625E0CC1D0FE42369715F2A4810BDF7F9CF19A28B5603
                                                                                                                                                                                          SHA-512:B23C6C28FEE0A8CA93DB2928A9AC97DD8475B7C1FC6DCB70E696F066D67DF4FF0285D7631400DEDD780C4B5F868B194CC59108FCFA519473D1ADDEC36CC53262
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Indian/Reunion) {.. {-9223372036854775808 13312 0 LMT}.. {-1848886912 14400 0 +04}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):166
                                                                                                                                                                                          Entropy (8bit):4.809541513808179
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8g5YFeovXHAIgNqjyVHRL/+XiMr4WFKBpv:SlSWB9vsM3yA5oPHAIgcjeHN/+Xvr4wY
                                                                                                                                                                                          MD5:A90C26358FEF60E49044E3BE02866FAC
                                                                                                                                                                                          SHA1:137AC8CCA23F39E7A16C4050EA9A3A8731E9AAD7
                                                                                                                                                                                          SHA-256:FE7F4453CB5F6B81B23C1C795356B91FE319F0762BE7868FAFE361DB1F9C2A2B
                                                                                                                                                                                          SHA-512:D6C74CACF69D29E14CB46E5DD885234AC50EE2E258E0C5E3AC76465061622F064F974D33E91A6A020B9D618D90799DDA6EB1EA53022EDB6E26A9CB6ADFE0AA30
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Tehran)]} {.. LoadTimeZoneFile Asia/Tehran..}..set TZData(:Iran) $TZData(:Asia/Tehran)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):177
                                                                                                                                                                                          Entropy (8bit):4.8290104377288925
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq85zFFfXHAIgN0AzFFVHRL/+WXnMr4WFKYzFgn:SlSWB9vsM3yZbPHAIgCAXRN/+zr4wKY+
                                                                                                                                                                                          MD5:6BCC43951637D86ED54585BE0819E39C
                                                                                                                                                                                          SHA1:6F04F306B3AB2A6419377294238B3164F86EF4A3
                                                                                                                                                                                          SHA-256:805105F5F17B78929F8476BAE83ED972128633FF6F74B7748B063E3C810C27A6
                                                                                                                                                                                          SHA-512:ABB9F4308BF4BD5C62C215A7ECD95042CBFB3005AF1E75F640962B022574C930DD5A12CD0CE0AF8A3D7E38B999E37C3A45A55091683F6A87E9D0CDA9EE417293
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Jerusalem)]} {.. LoadTimeZoneFile Asia/Jerusalem..}..set TZData(:Israel) $TZData(:Asia/Jerusalem)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):181
                                                                                                                                                                                          Entropy (8bit):4.722012123002917
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx00EIECWXHAIg200EIE/vHRL/9S//2IAcGE0EIESvn:SlSWB9vsM3y795VHAIgp95HN/029095c
                                                                                                                                                                                          MD5:1F020341AD51AA82794B8018F214DE0D
                                                                                                                                                                                          SHA1:4414E56C1277B4D31FE557F8652D522C0594F4B2
                                                                                                                                                                                          SHA-256:F01B00D52BD7B2694BF5CB55A17028C30A41BD22A774CA54740E8B1DDE4FCB2E
                                                                                                                                                                                          SHA-512:CC41848A851D4992AE9F27C38669CB87CE2FD05A33AB6989EA21AFCB1A2707DE0CB4D62BCC45E536DD944859991D7564847205F47509A42D41932370496A77D7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Jamaica)]} {.. LoadTimeZoneFile America/Jamaica..}..set TZData(:Jamaica) $TZData(:America/Jamaica)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):164
                                                                                                                                                                                          Entropy (8bit):4.8422204749795545
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8aofXHAIgNqsRL/9hM7/4WFK9vn:SlSWB9vsM3ypPHAIgcsN/4r4wKNn
                                                                                                                                                                                          MD5:9554A65BFFCFFCFB2C1588569BB4638E
                                                                                                                                                                                          SHA1:B377ECB04586396D37093856AEF8BBDC93192F66
                                                                                                                                                                                          SHA-256:98DBD07AE3B9251B9091F4D265336CE98BDFB492AF863C1F3FF25248A2CADF35
                                                                                                                                                                                          SHA-512:E2E761B8B1995B68721BC714A546E0F45EEC025FAF81DE579FF0D73D37783D0E031B9E78BA2FAC6B097E3673C47AFB8761FBC58E42E33018FD44B77F2871E0C6
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Tokyo)]} {.. LoadTimeZoneFile Asia/Tokyo..}..set TZData(:Japan) $TZData(:Asia/Tokyo)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):189
                                                                                                                                                                                          Entropy (8bit):4.810216093939366
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG1/EOM23vXHAIgObT1/EOMH6RL/8/FMKpUDH1/Ex:SlSWB9vsM3yc1EiPHAIgOb1E+N/8xMEx
                                                                                                                                                                                          MD5:05C0C40F2AA456F580EAAFC4F7E49B56
                                                                                                                                                                                          SHA1:5796A9122693B2D6010BC5E617A6091F46330B0C
                                                                                                                                                                                          SHA-256:85E95363ACF468043CD5146927A97B2D9E3B141EDA0A7993DADA9382D1D6DD54
                                                                                                                                                                                          SHA-512:2155F8E3EB73312F0AFD5CDDF4B19EBB67A15658101870C2CEDF96955470DBC7B30F34E143D9C14CBFA7A138F63324009581BD0B807AE295C68588CA0470D7AD
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Kwajalein)]} {.. LoadTimeZoneFile Pacific/Kwajalein..}..set TZData(:Kwajalein) $TZData(:Pacific/Kwajalein)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):176
                                                                                                                                                                                          Entropy (8bit):4.829980800076139
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqsbKJqYkyXHAIgNGEnKJp0ARL/7beDcbKJ6v:SlSWB9vsM3y7JSHAIgNTxAN/PeDE
                                                                                                                                                                                          MD5:4D44D88336212E162CCEFADE6321EDBC
                                                                                                                                                                                          SHA1:B9EE7AFE26DC61AA9EA37EB99A3C10DD176E8063
                                                                                                                                                                                          SHA-256:F776839C1999056E6A0D2ECFDF9054FC309454AFDFF8E8BC803F33EC423B7361
                                                                                                                                                                                          SHA-512:FDDCBD194DE07B51DEBBDEF4FD96762EE3507117443FB9F7975FB56E0AE97B0D1F8657FE26B092021FB12B5A5D3EFFAB9E0A54B1C2AFCEC1029855442A0A95AB
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Africa/Tripoli)]} {.. LoadTimeZoneFile Africa/Tripoli..}..set TZData(:Libya) $TZData(:Africa/Tripoli)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7736
                                                                                                                                                                                          Entropy (8bit):3.799706947156251
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:aJCP8D3pCS2JWk55EyqJNSPTub3NDOyFyJYVtLbTxdqs0xcQVq+O7JSAmwQZjltB:FSyWBSPTujlOyqc3JuzVNvTN
                                                                                                                                                                                          MD5:02B993B4A6956014A2DB844E8A5498C0
                                                                                                                                                                                          SHA1:378333547254AC43BEB4FA2CBC24B8DE241B3078
                                                                                                                                                                                          SHA-256:DF45F5414F1636B1856C7534BB5F3D4387C32D56283A68BB47D8C48C1DDAD5BC
                                                                                                                                                                                          SHA-512:CC3ABCC1FB5ABD10A685F140931DE38D6875142D3595F8D9A581F5B31A7F354FA4CCC9727B69F58E0D2F773EA0F76D9ACFDF7ACBAFC6BAA6E93A46EAE8F18672
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:MET) {.. {-9223372036854775808 3600 0 MET}.. {-1693706400 7200 1 MEST}.. {-1680483600 3600 0 MET}.. {-1663455600 7200 1 MEST}.. {-1650150000 3600 0 MET}.. {-1632006000 7200 1 MEST}.. {-1618700400 3600 0 MET}.. {-938905200 7200 1 MEST}.. {-857257200 3600 0 MET}.. {-844556400 7200 1 MEST}.. {-828226800 3600 0 MET}.. {-812502000 7200 1 MEST}.. {-796777200 3600 0 MET}.. {-781052400 7200 1 MEST}.. {-766623600 3600 0 MET}.. {228877200 7200 1 MEST}.. {243997200 3600 0 MET}.. {260326800 7200 1 MEST}.. {276051600 3600 0 MET}.. {291776400 7200 1 MEST}.. {307501200 3600 0 MET}.. {323830800 7200 1 MEST}.. {338950800 3600 0 MET}.. {354675600 7200 1 MEST}.. {370400400 3600 0 MET}.. {386125200 7200 1 MEST}.. {401850000 3600 0 MET}.. {417574800 7200 1 MEST}.. {433299600 3600 0 MET}.. {449024400 7200 1 MEST}.. {465354000 3600 0 MET}.. {481078800 7200
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):111
                                                                                                                                                                                          Entropy (8bit):4.902637155364683
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/6xtNMXGm2OHrXV4foAov:SlSWB9eg/6lDm2OHrCAAov
                                                                                                                                                                                          MD5:36119516E87814F3C219193069CD6A90
                                                                                                                                                                                          SHA1:BDB25531B30E6FC454100F37177EC9D4A0FB4E39
                                                                                                                                                                                          SHA-256:E57746D5DB479A8B30973F2BC16E2B8DFB6E2BFAECBFF0FB956F04526E4B935B
                                                                                                                                                                                          SHA-512:2730C5DABA0B2CCFD32A799C48EE07351659F51B9C2B91DCD145675AF276F2D0B5AA51ACF7D283C0DC236D3AFA3A75E58EB9F970B1831A6E36F02139CAF6A655
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:MST) {.. {-9223372036854775808 -25200 0 MST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8505
                                                                                                                                                                                          Entropy (8bit):3.8405400251137207
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:T1ktwmGaLV911sF7Lv/PCewtA8CzSPyDLbrcUia:TswDPlLv/PCenJzS6cy
                                                                                                                                                                                          MD5:87B3BCD4A793BA383889ECFDB44C846E
                                                                                                                                                                                          SHA1:3EA34B5E6E3078A9501653BA069D5E5E879D7FE4
                                                                                                                                                                                          SHA-256:A5DEB89D59613D9A54C1E146056A805B3DE9F2A2593AEC2B8A25F863328699C0
                                                                                                                                                                                          SHA-512:AA4DAC2614661EF18A2A60A5BD4D5BBBCCB5D721F90A25E9D11C5B6AF8C39FD475B3E23894719E2F8F74469F13D5492FF31DDD193D9E3172182FBCBCDD860A41
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:MST7MDT) {.. {-9223372036854775808 -25200 0 MST}.. {-1633273200 -21600 1 MDT}.. {-1615132800 -25200 0 MST}.. {-1601823600 -21600 1 MDT}.. {-1583683200 -25200 0 MST}.. {-880210800 -21600 1 MWT}.. {-769395600 -21600 1 MPT}.. {-765388800 -25200 0 MST}.. {-84380400 -21600 1 MDT}.. {-68659200 -25200 0 MST}.. {-52930800 -21600 1 MDT}.. {-37209600 -25200 0 MST}.. {-21481200 -21600 1 MDT}.. {-5760000 -25200 0 MST}.. {9968400 -21600 1 MDT}.. {25689600 -25200 0 MST}.. {41418000 -21600 1 MDT}.. {57744000 -25200 0 MST}.. {73472400 -21600 1 MDT}.. {89193600 -25200 0 MST}.. {104922000 -21600 1 MDT}.. {120643200 -25200 0 MST}.. {126694800 -21600 1 MDT}.. {152092800 -25200 0 MST}.. {162378000 -21600 1 MDT}.. {183542400 -25200 0 MST}.. {199270800 -21600 1 MDT}.. {215596800 -25200 0 MST}.. {230720400 -21600 1 MDT}.. {247046400 -25200 0 MST}.. {262774800
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):190
                                                                                                                                                                                          Entropy (8bit):4.884776849010803
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0qfSfXHAIg20qfORL/6AdMSKBbh4IAcGEqfBn:SlSWB9vsM3y7ekHAIgpeON/68K5h490m
                                                                                                                                                                                          MD5:3050A0100A2313C1D3AB4278B464F17A
                                                                                                                                                                                          SHA1:1A140447B3972900F13768659FD6979F68126E97
                                                                                                                                                                                          SHA-256:F8CA38A845CD01BF785EE222277DAD9325AB6BD17E44A362C450855AEB522814
                                                                                                                                                                                          SHA-512:C91C4BF2318C50D473E6051855C12F0E11CBAA8580B88115CDDE054D36476A1D8DDC5D17A7A123BD84148C20B96BD839511EAD573F5FD2C9A8556646B9CDE5E5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Tijuana)]} {.. LoadTimeZoneFile America/Tijuana..}..set TZData(:Mexico/BajaNorte) $TZData(:America/Tijuana)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):191
                                                                                                                                                                                          Entropy (8bit):4.8897674180962145
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0zjRJ+ovXHAIg20zjRJ8yHRL/6AdMPCoQIAcGEzjy:SlSWB9vsM3y7zjRJvHAIgpzjRJ8yHN/Z
                                                                                                                                                                                          MD5:FAFD9727A0E153AFCB726690D215DA76
                                                                                                                                                                                          SHA1:3CD3B2737FC781F38DE26E255968CBB88B773CBF
                                                                                                                                                                                          SHA-256:2E6E32A40487F0146B59150B66FF74901CA853B12D47922819AF23EEA5B4149C
                                                                                                                                                                                          SHA-512:76D110494D4EB76961C818B2A2CCB2303B31DA161664FA712C87B95B81DE7B8F3E50DC7B2836C6ECC6437AE9595668E62E4E706F1B343EFEA12C32210F113540
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Mazatlan)]} {.. LoadTimeZoneFile America/Mazatlan..}..set TZData(:Mexico/BajaSur) $TZData(:America/Mazatlan)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):200
                                                                                                                                                                                          Entropy (8bit):4.877941255622543
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y7zBDSHAIgpzBx6N/6BXl490zBf:MByMYzppzH6t6Bi90z1
                                                                                                                                                                                          MD5:29ACBFCD0FD521EC0C9523906B9E2252
                                                                                                                                                                                          SHA1:BBC1AD3F78CAA634A2F0BC38059975EF8E4A2CE9
                                                                                                                                                                                          SHA-256:2DFF1B83FECFAD5C27EC47B206696C29B91398F8185B5D406A66FA9E0AECA93F
                                                                                                                                                                                          SHA-512:802502010CFB6F1F4E60C22ECB0E6CA22750975E5838BE7E7DC9D12EA019CB6508F0F87465A113A98356CC9E145E32E6633AE2B45B93412A358C4AD13E923EFE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Mexico_City)]} {.. LoadTimeZoneFile America/Mexico_City..}..set TZData(:Mexico/General) $TZData(:America/Mexico_City)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):179
                                                                                                                                                                                          Entropy (8bit):4.888611285267583
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG/u4WXHAIgObT/KvRRL/5E1nUDH/uov:SlSWB9vsM3ycqXHAIgObOvRN/iy
                                                                                                                                                                                          MD5:92548E239012515D756E002768CA876A
                                                                                                                                                                                          SHA1:6BDC73DBD7356C3F82C5C76E6E2D58656FA9E21D
                                                                                                                                                                                          SHA-256:E22D629D53C54960AD156C377DE0AE461C27F554990A3D1305724CA8F869BCE4
                                                                                                                                                                                          SHA-512:42AD074EE08E083EE91270F203707698A8B3308005C94514B8B2D950F4C6F0B37D7D32973EC9F6AB49A0875209076FB40341B31433A27E47B3CC0EA711ECE321
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Auckland)]} {.. LoadTimeZoneFile Pacific/Auckland..}..set TZData(:NZ) $TZData(:Pacific/Auckland)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):181
                                                                                                                                                                                          Entropy (8bit):4.881663364410736
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG9WQ+DyXHAIgObT9WQiovRL/5AmtBFB/pUDH9WQg:SlSWB9vsM3ycwQ+DSHAIgObwQTN/zzJ7
                                                                                                                                                                                          MD5:3811C133C6311E33FDAF93660E1EAED5
                                                                                                                                                                                          SHA1:64756FF877B2EB91BAED2889B3924DAB6784DF43
                                                                                                                                                                                          SHA-256:83F4CA3522B64F9B151EDEFAE53E0F28C2E6C4CE16D0982186B3344F2A268724
                                                                                                                                                                                          SHA-512:7724D6CD08E13E116CCDF073F86CE317C0D4A849C5FE81DF3127D435704507FBF554BFC6E7A50CCA3852F6001D8654B7FF90466878DB8C3298338BE16149FD32
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Chatham)]} {.. LoadTimeZoneFile Pacific/Chatham..}..set TZData(:NZ-CHAT) $TZData(:Pacific/Chatham)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):177
                                                                                                                                                                                          Entropy (8bit):4.8545620422964015
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx06RGFfXHAIg206RORL/5vf1+IAcGE6RB:SlSWB9vsM3y7+SPHAIgp+ON/pd+90+B
                                                                                                                                                                                          MD5:5E9F3294F68873BF503F3DDDDF6713B0
                                                                                                                                                                                          SHA1:954CD6F123C043E64F5E49733327E2C78877BDFB
                                                                                                                                                                                          SHA-256:2CC8CE235F2EE3160E6AFD04A4E28AA0312494EBB6FED08D8CC81D414EC540EE
                                                                                                                                                                                          SHA-512:200FC489989CA57219D5B28FB135BE5BDAC67239F3D243C496545D86D68089E51856CEAC4D2E700C0E47BAE4D5FEAB18A367C554235615B2B860F4E5E1BB08C3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Denver)]} {.. LoadTimeZoneFile America/Denver..}..set TZData(:Navajo) $TZData(:America/Denver)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):171
                                                                                                                                                                                          Entropy (8bit):4.902914099699953
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8qvfXHAIgNtaYFARL/nL75h4WFKdy:SlSWB9vsM3yMPHAIgO8AN/H5h4wKU
                                                                                                                                                                                          MD5:87C439DC623BF5C7EB01ADA6E67FB63A
                                                                                                                                                                                          SHA1:1CC357558E09CDEA49F821826D2AEA9A6EF2C824
                                                                                                                                                                                          SHA-256:6A5BAA9CA54B2A2C6D21287443BE0B1064AA79B5C4C62939933F8A0AD842B73E
                                                                                                                                                                                          SHA-512:E628B8F1C967AABAEFBB68A33416F6FE47422970BA18414BB3396AC063E65A4DC892595D4071395194AF320633EE915A494E1F8D4216EE8194A034739D275C49
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Shanghai)]} {.. LoadTimeZoneFile Asia/Shanghai..}..set TZData(:PRC) $TZData(:Asia/Shanghai)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8505
                                                                                                                                                                                          Entropy (8bit):3.836877329152454
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:0KhTG0hjvZkR/bvtw+N6IkWq/WHQlb/RYRWVIKr7cRRL:0sG0U9bFzN6IkWq/WHQt/RY4yP
                                                                                                                                                                                          MD5:45E7E9E183A990F56E17C04FA48CE620
                                                                                                                                                                                          SHA1:A1F39E0ECEA3C64E761A9A3159E331FA51B625F9
                                                                                                                                                                                          SHA-256:D148708F1E70EEFA51E88E5823776CBE710535D4D6D6356E7753A44463A1C5AB
                                                                                                                                                                                          SHA-512:1D1F4BA90D07D7EE12DFD0E37DBFD5410A4EAFFBA8960B816FDD5963CD6B20938080A4248E7B249AAE02F068E817AB9A85735D226F7DA8DD2C5462A70B18E8EF
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:PST8PDT) {.. {-9223372036854775808 -28800 0 PST}.. {-1633269600 -25200 1 PDT}.. {-1615129200 -28800 0 PST}.. {-1601820000 -25200 1 PDT}.. {-1583679600 -28800 0 PST}.. {-880207200 -25200 1 PWT}.. {-769395600 -25200 1 PPT}.. {-765385200 -28800 0 PST}.. {-84376800 -25200 1 PDT}.. {-68655600 -28800 0 PST}.. {-52927200 -25200 1 PDT}.. {-37206000 -28800 0 PST}.. {-21477600 -25200 1 PDT}.. {-5756400 -28800 0 PST}.. {9972000 -25200 1 PDT}.. {25693200 -28800 0 PST}.. {41421600 -25200 1 PDT}.. {57747600 -28800 0 PST}.. {73476000 -25200 1 PDT}.. {89197200 -28800 0 PST}.. {104925600 -25200 1 PDT}.. {120646800 -28800 0 PST}.. {126698400 -25200 1 PDT}.. {152096400 -28800 0 PST}.. {162381600 -25200 1 PDT}.. {183546000 -28800 0 PST}.. {199274400 -25200 1 PDT}.. {215600400 -28800 0 PST}.. {230724000 -25200 1 PDT}.. {247050000 -28800 0 PST}.. {262778400
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):909
                                                                                                                                                                                          Entropy (8bit):4.042826306713664
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB86HbmdH2oVCvcCfdf3NaDyTb6Dye78ubUt1NEUtszIVbUtoUtoUt3mbUt4qUt6:Yekv5fcfem+Cuy
                                                                                                                                                                                          MD5:E5B913965F72AB807BAE67BD20C0A699
                                                                                                                                                                                          SHA1:2161B73EC868C8D18C09970766D19A8583FF7981
                                                                                                                                                                                          SHA-256:983884249ACC11C3FE740D78E72B1A89BE9C8B077283549BF6BCD8C93FA71731
                                                                                                                                                                                          SHA-512:F8807C52DB852C48C62F25569C990C31D977BC7D0DF502CF2B92F9ED6BCB89A6DD8A6758FBD1185E0B5C34DE5450D5C748B71760AC93E72DC3976B3B31D1A605
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Apia) {.. {-9223372036854775808 45184 0 LMT}.. {-2445424384 -41216 0 LMT}.. {-1861878784 -41400 0 -1130}.. {-631110600 -39600 0 -11}.. {1285498800 -36000 1 -11}.. {1301752800 -39600 0 -11}.. {1316872800 -36000 1 -11}.. {1325239200 50400 0 +13}.. {1333202400 46800 0 +13}.. {1348927200 50400 1 +13}.. {1365256800 46800 0 +13}.. {1380376800 50400 1 +13}.. {1396706400 46800 0 +13}.. {1411826400 50400 1 +13}.. {1428156000 46800 0 +13}.. {1443276000 50400 1 +13}.. {1459605600 46800 0 +13}.. {1474725600 50400 1 +13}.. {1491055200 46800 0 +13}.. {1506175200 50400 1 +13}.. {1522504800 46800 0 +13}.. {1538229600 50400 1 +13}.. {1554559200 46800 0 +13}.. {1569679200 50400 1 +13}.. {1586008800 46800 0 +13}.. {1601128800 50400 1 +13}.. {1617458400 46800 0 +13}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8772
                                                                                                                                                                                          Entropy (8bit):3.900078030355782
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:pj4hKuZaqaaiFKgjGeGV3atL67G9kJGsU+mpe7Vy:Cla1KgjGeGcQMsa
                                                                                                                                                                                          MD5:8174D7205622711F58E0B515246FE89D
                                                                                                                                                                                          SHA1:9777B2633ACF5588268D5072F817E65C879358AC
                                                                                                                                                                                          SHA-256:201CFADB00FBCD3283249DAD73872ED75C5BEC07F5A5B157726638C20728B833
                                                                                                                                                                                          SHA-512:64121ED1EE70D5423710319E806B19261576AECC89A64CBEC44A29BF4AC9FEE21C6484CC3C4550CC92C315B3855BE265F696F8CD4D95027226D608B3ADD022F1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Auckland) {.. {-9223372036854775808 41944 0 LMT}.. {-3192435544 41400 0 NZMT}.. {-1330335000 45000 1 NZST}.. {-1320057000 41400 0 NZMT}.. {-1300699800 43200 1 NZST}.. {-1287396000 41400 0 NZMT}.. {-1269250200 43200 1 NZST}.. {-1255946400 41400 0 NZMT}.. {-1237800600 43200 1 NZST}.. {-1224496800 41400 0 NZMT}.. {-1206351000 43200 1 NZST}.. {-1192442400 41400 0 NZMT}.. {-1174901400 43200 1 NZST}.. {-1160992800 41400 0 NZMT}.. {-1143451800 43200 1 NZST}.. {-1125914400 41400 0 NZMT}.. {-1112607000 43200 1 NZST}.. {-1094464800 41400 0 NZMT}.. {-1081157400 43200 1 NZST}.. {-1063015200 41400 0 NZMT}.. {-1049707800 43200 1 NZST}.. {-1031565600 41400 0 NZMT}.. {-1018258200 43200 1 NZST}.. {-1000116000 41400 0 NZMT}.. {-986808600 43200 1 NZST}.. {-968061600 41400 0 NZMT}.. {-955359000 43200 1 NZST}.. {-936612000 41400 0 NZMT}.. {-923304600 4320
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):280
                                                                                                                                                                                          Entropy (8bit):4.715653436088026
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/FtTfDm2OHHhp5oHvZiuo2HvDVeEU8vScH9syZEizy:MB86FtTLmdHf5CvZiIvJeJ8HH9F6izy
                                                                                                                                                                                          MD5:4E858B3754BD8864719A61839ACA64E6
                                                                                                                                                                                          SHA1:597025A8DAFD5AE75EBD162AC0E9DA71815816BA
                                                                                                                                                                                          SHA-256:2D3BFDED297214BA25CFD8C6F508D0C8B1A1CD7D46701A78EC5E510076185EB6
                                                                                                                                                                                          SHA-512:720F301B73C852EA8EEFA79DEF6B6762554E50222DE114FE87EB5178507F1895A9A39B3872A1A4B9DFF58D1CC6460BA4A82F2C165E3659E13036451F22E389C3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Bougainville) {.. {-9223372036854775808 37336 0 LMT}.. {-2840178136 35312 0 PMMT}.. {-2366790512 36000 0 +10}.. {-868010400 32400 0 +09}.. {-768906000 36000 0 +10}.. {1419696000 39600 0 +11}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8165
                                                                                                                                                                                          Entropy (8bit):3.6566720439018874
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:gpvlGCcn6AadFurBrioCdL49mq9X4a2t3I/KVE:gOCBdFurBr0soaz
                                                                                                                                                                                          MD5:8105A806A1762932897AB59C47BBE89E
                                                                                                                                                                                          SHA1:386E41A4A83FA84DBFCA994F679242D067CEED64
                                                                                                                                                                                          SHA-256:CA0EEF84DBC5964EF2265E9252237BE58BB8D75C34817CC2305CCCFAEC7E690C
                                                                                                                                                                                          SHA-512:8A609E7F4868BD455DA811E62142FECD792D0CA0DAAF7C10C4E4254C9EC44B8EB92D388D9224C8FD3CC3FB326A106D831B80F5E1264CCF3EABBCE177BB82E9D6
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Chatham) {.. {-9223372036854775808 44028 0 LMT}.. {-3192437628 44100 0 +1215}.. {-757426500 45900 0 +1245}.. {152632800 49500 1 +1245}.. {162309600 45900 0 +1245}.. {183477600 49500 1 +1245}.. {194968800 45900 0 +1245}.. {215532000 49500 1 +1245}.. {226418400 45900 0 +1245}.. {246981600 49500 1 +1245}.. {257868000 45900 0 +1245}.. {278431200 49500 1 +1245}.. {289317600 45900 0 +1245}.. {309880800 49500 1 +1245}.. {320767200 45900 0 +1245}.. {341330400 49500 1 +1245}.. {352216800 45900 0 +1245}.. {372780000 49500 1 +1245}.. {384271200 45900 0 +1245}.. {404834400 49500 1 +1245}.. {415720800 45900 0 +1245}.. {436284000 49500 1 +1245}.. {447170400 45900 0 +1245}.. {467733600 49500 1 +1245}.. {478620000 45900 0 +1245}.. {499183200 49500 1 +1245}.. {510069600 45900 0 +1245}.. {530632800 49500 1 +1245}.. {541519200 45900 0 +1245}.. {56208
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):305
                                                                                                                                                                                          Entropy (8bit):4.600179085934857
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/ZzSDm2OH9pvoHT1YoHvmdcXALEzvScHoVvXKnOjvScHb01Fy:MB86RGmdH9pvCT1YCvnXALEzHHIfKOjd
                                                                                                                                                                                          MD5:AEC058BE796F1513F3DF3E545290D223
                                                                                                                                                                                          SHA1:27D274974AC95B724A4BFDD65CB1B9DD92F73E3D
                                                                                                                                                                                          SHA-256:492DF366BB0A7D29D2DB4A9C40CF0C15CB47343FF908D1AA86092C8E84E4434B
                                                                                                                                                                                          SHA-512:E0924AB86E512AE1B800DEFA637F6B1743FF77F1FEFDC5068A7C30C1AC0BAC60F0D0351278866FD98A59D56BA2C56A1AFC1EBB4F14AAFE5D450085587B7C8F4A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Chuuk) {.. {-9223372036854775808 -49972 0 LMT}.. {-3944628428 36428 0 LMT}.. {-2177489228 36000 0 +10}.. {-1743674400 32400 0 +09}.. {-1606813200 36000 0 +10}.. {-907408800 32400 0 +09}.. {-770634000 36000 0 +10}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8203
                                                                                                                                                                                          Entropy (8bit):3.546693824302767
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:QXn3AWkHkPp2YXaVU+PO/Un4n6MSmSmiTpk9eL6Z5waKkhWILTc:QXn3AWJB2m+PO/UnOSmSmS6ZaILg
                                                                                                                                                                                          MD5:B8B2048F107528DEB4B04CB3E698A5BD
                                                                                                                                                                                          SHA1:0E82DCB11A4553771760B8B0A748EC03F953D2FB
                                                                                                                                                                                          SHA-256:84B815988D1A5AC16F3EC52844BDCE7A8E8707800C782235B5928473EEF9B433
                                                                                                                                                                                          SHA-512:511E3C51B4016641146D21264C031151F2CE9F916F0D97C47D623B66F6244BA9243108179C786B63B8B71F77885B916AC6D18C10CFA1001290019CE6B73278D9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Easter) {.. {-9223372036854775808 -26248 0 LMT}.. {-2524495352 -26248 0 EMT}.. {-1178124152 -25200 0 -07}.. {-36619200 -21600 1 -07}.. {-23922000 -25200 0 -07}.. {-3355200 -21600 1 -07}.. {7527600 -25200 0 -07}.. {24465600 -21600 1 -07}.. {37767600 -25200 0 -07}.. {55915200 -21600 1 -07}.. {69217200 -25200 0 -07}.. {87969600 -21600 1 -07}.. {100666800 -25200 0 -07}.. {118209600 -21600 1 -07}.. {132116400 -25200 0 -07}.. {150868800 -21600 1 -07}.. {163566000 -25200 0 -07}.. {182318400 -21600 1 -07}.. {195620400 -25200 0 -07}.. {213768000 -21600 1 -07}.. {227070000 -25200 0 -07}.. {245217600 -21600 1 -07}.. {258519600 -25200 0 -07}.. {277272000 -21600 1 -07}.. {289969200 -25200 0 -07}.. {308721600 -21600 1 -07}.. {321418800 -25200 0 -07}.. {340171200 -21600 1 -07}.. {353473200 -25200 0 -07}.. {371620800 -21600 1 -07}.. {384922800
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):789
                                                                                                                                                                                          Entropy (8bit):4.0457106900970325
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB86HmdH6mvCON3Xj/kw2eX/xtDedjX24ots0FX2ud5KRGkpFxy:uegazZBzCdXUFQzy
                                                                                                                                                                                          MD5:6841B8A2FB9BBF464AA00088CBDCEC80
                                                                                                                                                                                          SHA1:26CC5CCE00A765F8B6493ED24F50957AA7F0089B
                                                                                                                                                                                          SHA-256:332372E5EFB46123FBB66F9F32F91B59EBD88ADB956249DB3F14CAAB01CE2655
                                                                                                                                                                                          SHA-512:A6C67A0F7361E599369597E9A8A52FC7D5C96DE6B5A7C1BE1D02F5DF11051F448289786C7F0E82E71CDEB825215E64E072CF034C45D6E2F822D7201AB8B41B57
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Efate) {.. {-9223372036854775808 40396 0 LMT}.. {-1829387596 39600 0 +11}.. {125409600 43200 1 +11}.. {133876800 39600 0 +11}.. {433256400 43200 1 +11}.. {448977600 39600 0 +11}.. {464706000 43200 1 +11}.. {480427200 39600 0 +11}.. {496760400 43200 1 +11}.. {511876800 39600 0 +11}.. {528210000 43200 1 +11}.. {543931200 39600 0 +11}.. {559659600 43200 1 +11}.. {575380800 39600 0 +11}.. {591109200 43200 1 +11}.. {606830400 39600 0 +11}.. {622558800 43200 1 +11}.. {638280000 39600 0 +11}.. {654008400 43200 1 +11}.. {669729600 39600 0 +11}.. {686062800 43200 1 +11}.. {696340800 39600 0 +11}.. {719931600 43200 1 +11}.. {727790400 39600 0 +11}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):188
                                                                                                                                                                                          Entropy (8bit):4.82787610497142
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG11avXHAIgObT11ORL/nUDH7/UDH11B:SlSWB9vsM3yckHAIgObON/h
                                                                                                                                                                                          MD5:CD1AC50AADC3CF9C0E7A055D587E790D
                                                                                                                                                                                          SHA1:BEE0E16D3954DF33C697DEA469A130BD9875AB8B
                                                                                                                                                                                          SHA-256:790E6B48B261D6DEF7D183CC8F38FB8D8A6E3EFB8844281EFABB2DFD621E53B5
                                                                                                                                                                                          SHA-512:B6A93DFB4CBE2F35268AACA88FDCC4D19949A2E8DC9464D8341C38065C6FF48A3C49FE756FFCE777C8F806DE309C8AFC4CE4BC4ABD183C28808F995A0F89B091
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Kanton)]} {.. LoadTimeZoneFile Pacific/Kanton..}..set TZData(:Pacific/Enderbury) $TZData(:Pacific/Kanton)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):185
                                                                                                                                                                                          Entropy (8bit):4.913439535905759
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/nUDH4ErKYofMXGm2OH18VkeoHvmUENBBy/aCPFVFv7Dy:SlSWB9eg/BE3ofDm2OH1VeoHvmH7y/Fy
                                                                                                                                                                                          MD5:6250F332356787613A2D1853EF6D1AC3
                                                                                                                                                                                          SHA1:0464B9EE8B691990022295D2DEFE1AAE4B247E63
                                                                                                                                                                                          SHA-256:336058DCA4802C79ED43F6177ADB73085D4FA0754B94051CAE2A19346B0C4904
                                                                                                                                                                                          SHA-512:B8FAB5E128D2EF3CB7050DA717D80247045BE09F7F6542AA154CB85F4A56884F195EE2776421890A3F86D133106DCA4672D7D9329E0DE6F4A7CF8F4030822988
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Fakaofo) {.. {-9223372036854775808 -41096 0 LMT}.. {-2177411704 -39600 0 -11}.. {1325242800 46800 0 +13}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):5636
                                                                                                                                                                                          Entropy (8bit):3.637086785452708
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:9QdCQvGPccyGqjXKZ2luR7oVqqJZozv88s2:Wd9vGPfyGi6Z2opCs
                                                                                                                                                                                          MD5:D2A17937A99B50B3BCD50F8C10520B56
                                                                                                                                                                                          SHA1:A27681C6EC2B4625262359E5ADFEA09CAB58FAFC
                                                                                                                                                                                          SHA-256:A29FAAEE67BC07F5DF858DAC070F03E45E29B67A5F9DE6DD992E79A9601979B7
                                                                                                                                                                                          SHA-512:A16F96B17E7221A9C60EF506D7ABFE806304AAAB8C64A69E340E9960BEB64C7334931CD6FBBA5F22A1A3BFFE55690BDF04E60852E516CB3048EE34AC3EAB16CC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Fiji) {.. {-9223372036854775808 42944 0 LMT}.. {-1709985344 43200 0 +12}.. {909842400 46800 1 +12}.. {920124000 43200 0 +12}.. {941896800 46800 1 +12}.. {951573600 43200 0 +12}.. {1259416800 46800 1 +12}.. {1269698400 43200 0 +12}.. {1287842400 46800 1 +12}.. {1299333600 43200 0 +12}.. {1319292000 46800 1 +12}.. {1327154400 43200 0 +12}.. {1350741600 46800 1 +12}.. {1358604000 43200 0 +12}.. {1382796000 46800 1 +12}.. {1390050000 43200 0 +12}.. {1414850400 46800 1 +12}.. {1421503200 43200 0 +12}.. {1446300000 46800 1 +12}.. {1452952800 43200 0 +12}.. {1478354400 46800 1 +12}.. {1484402400 43200 0 +12}.. {1509804000 46800 1 +12}.. {1515852000 43200 0 +12}.. {1541253600 46800 1 +12}.. {1547301600 43200 0 +12}.. {1573308000 46800 1 +12}.. {1578751200 43200 0 +12}.. {1608386400 46800 1 +12}.. {1610805600 43200 0 +12}.. {1668261600 4
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):154
                                                                                                                                                                                          Entropy (8bit):5.018668544746349
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/nUDH4QwyFPMXGm2OHwodGeoHvmcpXrWXVN0UIoAov:SlSWB9eg/BCPDm2OHwxeoHvmgSX0YAov
                                                                                                                                                                                          MD5:C1547FDC362DA1162FE7B53BC16AEA87
                                                                                                                                                                                          SHA1:3249423B61C42E6CE54A77BACA0A8FDFD2594CF9
                                                                                                                                                                                          SHA-256:B2ACF1461318A0B21653B6F21DE5E54651A417A469AAD0DBF8099626040BEB51
                                                                                                                                                                                          SHA-512:76D0F4489CCB32A8CDCA5151E086E93A0199C6FF5066DD73F873F103F7592BFE4A3765BC862246817C2F0CA7F33B02EF40E5A3C9CF461A07D9AF03F623FC08FB
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Funafuti) {.. {-9223372036854775808 43012 0 LMT}.. {-2177495812 43200 0 +12}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):247
                                                                                                                                                                                          Entropy (8bit):4.687336389955113
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/fEGDm2OHvQYeoHTie7KVQRncRvinrN5/uFifriX:MB86fhmdH0CTV7OcdrN5/uFiGX
                                                                                                                                                                                          MD5:0557D164DCD8DF5D99F7AF5A2AB1AD4F
                                                                                                                                                                                          SHA1:68AFD04303E5F541480425405D82E1827F78A8DF
                                                                                                                                                                                          SHA-256:192545659F971084ADC8489A2B96A6439FF391599DC962AA13375ACCFB3C09D9
                                                                                                                                                                                          SHA-512:1DA004E51F8E7A712EDE920CBB62E81F9F55450FB52B62F78F1CD4F8F4E342B4DAB2C28AA5161E8B24942A7A5BD55F978AFDA1C5E1949241E71D738079DEF9B8
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Galapagos) {.. {-9223372036854775808 -21504 0 LMT}.. {-1230746496 -18000 0 -05}.. {504939600 -21600 0 -06}.. {722930400 -18000 1 -06}.. {728888400 -21600 0 -06}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):155
                                                                                                                                                                                          Entropy (8bit):4.976931060677737
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/nUDH5hBYfMXGm2OHKToxYoHsdNfis:SlSWB9eg/DDm2OHPxYoH4qs
                                                                                                                                                                                          MD5:45330CE0FA604304C6ACF8EF8CAF51EC
                                                                                                                                                                                          SHA1:20EEF9646996C2EC9B2641EBCCBE4766BF38B17B
                                                                                                                                                                                          SHA-256:190E02A0C00D165FA45C73AEF9C0D6C82B1720E7406E5610DD860AED10A021A5
                                                                                                                                                                                          SHA-512:51C7931B503405DA0B4078F6BE411895DD00E86AC7C5BE475030664D5302AD614293541DEE7FFC3D86A9DDB1BDA32BCAA746CF1D207DB063FBA2F9E9BE12836C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Gambier) {.. {-9223372036854775808 -32388 0 LMT}.. {-1806678012 -32400 0 -09}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):157
                                                                                                                                                                                          Entropy (8bit):4.9796189407775255
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/nUDH5RyJTLJ5FNMXGm2OHddHvpoxYoHsdMWdHPVtyn:SlSWB9eg/LJHjXDm2OHdFGxYoHgHPLy
                                                                                                                                                                                          MD5:DF09960360D8CEDCA2A4DC19A177C4A6
                                                                                                                                                                                          SHA1:9F73F271B8C85B25FE6392B8BF7465C92EFFE621
                                                                                                                                                                                          SHA-256:161762334DFF48B1D58824911E1FF4171386EA18234DD3DD5B0798515593086A
                                                                                                                                                                                          SHA-512:1BE9E0F90DA529C99E317F399BFDB913A076651CF8801A1849247B26A350A76D8B5807AB139F3DBB97790DDFC332BDBEB57B364BF67FA2BB440AFEDC4130A648
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Guadalcanal) {.. {-9223372036854775808 38388 0 LMT}.. {-1806748788 39600 0 +11}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):733
                                                                                                                                                                                          Entropy (8bit):4.244282318063802
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB862mdHanCTCtBCv1yWQkHHLTaWJ+x+87W0x+8+yWSi+JW7+sWU0dwaW1j+FaW2:FeaC2twvY3knLGs+I87p+8d9i+J7s70c
                                                                                                                                                                                          MD5:BA319E451BE323C852A8ABFC299DDA28
                                                                                                                                                                                          SHA1:FC9314C162FF1FE1ED5E2C5DF962A55D4D6D8115
                                                                                                                                                                                          SHA-256:42CB69ABC83415F63CA7D2A3E5314A41817AEE3206ECCC7172C50A74B1597DB0
                                                                                                                                                                                          SHA-512:3BF733B9ED2A57B01BE173A8421B2D5A45888A230461EA0BD8C5B4AC7DC010BB527346731196141C70AFECDF88DD47AFE48636243DFC395D88E58231BEDF7D2A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Guam) {.. {-9223372036854775808 -51660 0 LMT}.. {-3944626740 34740 0 LMT}.. {-2177487540 36000 0 GST}.. {-885549600 32400 0 +09}.. {-802256400 36000 0 GST}.. {-331891200 39600 1 GDT}.. {-281610000 36000 0 GST}.. {-73728000 39600 1 GDT}.. {-29415540 36000 0 GST}.. {-16704000 39600 1 GDT}.. {-10659600 36000 0 GST}.. {9907200 39600 1 GDT}.. {21394800 36000 0 GST}.. {41356800 39600 1 GDT}.. {52844400 36000 0 GST}.. {124819200 39600 1 GDT}.. {130863600 36000 0 GST}.. {201888000 39600 1 GDT}.. {209487660 36000 0 GST}.. {230659200 39600 1 GDT}.. {241542000 36000 0 GST}.. {977493600 36000 0 ChST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):344
                                                                                                                                                                                          Entropy (8bit):4.640604617840767
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/PeDDm2OHsVVoHvBrai3UNFv+rUXaWFvAHovj/0nvCv7p+v:MB86WXmdH0VCvBz0GOTA0/0y74v
                                                                                                                                                                                          MD5:F3F0E64655FAA79E40860765EEBB5B77
                                                                                                                                                                                          SHA1:7F6C2FC100AEABC26B7205AB53C1E016B12E4D60
                                                                                                                                                                                          SHA-256:69319015799D32D3CF7C0A3E9991B4B1F3E0C5D1B4FBF400517350CCA9D2C3B7
                                                                                                                                                                                          SHA-512:7C9238BCCB13B90D4DC9B5E776C421A42C25D21B4E026406F57FA1E70983E8F6BF1CE927AB9D0D6261C5C1802A8B810399F506915262F82F487417CFD704B2F1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Honolulu) {.. {-9223372036854775808 -37886 0 LMT}.. {-2334101314 -37800 0 HST}.. {-1157283000 -34200 1 HDT}.. {-1155436200 -34200 0 HST}.. {-880201800 -34200 1 HWT}.. {-769395600 -34200 1 HPT}.. {-765376200 -37800 0 HST}.. {-712150200 -36000 0 HST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):193
                                                                                                                                                                                          Entropy (8bit):4.844454917943834
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3yc6e8SHAIgOb6eKAN/NWyVheo:MByMdniinbtNWzo
                                                                                                                                                                                          MD5:4244078A03C2493009EF2F6BDA2F326F
                                                                                                                                                                                          SHA1:AC2FF3E91A8831A479B33DF32A0118BC2EB255D0
                                                                                                                                                                                          SHA-256:6E52B361AC8A6A578C709F6D58AA7535F06C0CB1707081C2D5A63FA8545D955C
                                                                                                                                                                                          SHA-512:398B32E0FAF80E40DF3ACD203DF380D61DC39322F0BA0388A18281BC26973945F45683A104B9A785BB9DF5E514322F6994F934289E4B56B7982F94D4528D4272
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Honolulu)]} {.. LoadTimeZoneFile Pacific/Honolulu..}..set TZData(:Pacific/Johnston) $TZData(:Pacific/Honolulu)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):208
                                                                                                                                                                                          Entropy (8bit):4.669308556946547
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/KyXDm2OHEMmzQwXy29BVyv7y/fTVVFty:MB86KyTmdHEZzQUBVyDy/fZvty
                                                                                                                                                                                          MD5:544A0A83241333805192A6F03888E359
                                                                                                                                                                                          SHA1:99D2BE79D57B44BD538386F9E7551C9E1874D7E3
                                                                                                                                                                                          SHA-256:0B1345555EC2B4738CC4DEBFE496C287966F238386263032FF1E27912CCBFBA6
                                                                                                                                                                                          SHA-512:61C91265632D01FBB7F4C739368756C428258FA6C141E49E88B6C78ABEA6150A74B8DFCF14C5AADDA03C1EA6F04D122734654495C26B8614561786B1C5C7EF10
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Kanton) {.. {-9223372036854775808 0 0 -00}.. {-1020470400 -43200 0 -12}.. {307627200 -39600 0 -11}.. {788871600 46800 0 +13}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):219
                                                                                                                                                                                          Entropy (8bit):4.739672105601744
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/iSDm2OHjkeoHvmLVFFz4YWXfSzvjNv:MB86iGmdHpCvU4VfSbxv
                                                                                                                                                                                          MD5:1B695BBB9C50F6AFC05F67DE30374160
                                                                                                                                                                                          SHA1:08AD8BBB6C99EB36FC3E462DB41C6896F52F150C
                                                                                                                                                                                          SHA-256:4F7235B956A5A01676BE05275E086D5157EBC24FD91022E87817020669F915F7
                                                                                                                                                                                          SHA-512:DC35CB1C2E5E035A82F91D1B1F4B48D7B112D9B7A1A7DB9C4A4C42C4D58002E1ECD9D24B2EA5B624DBB526ADDF9A8AB37D4315843207C34C16B2EFE33A254752
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Kiritimati) {.. {-9223372036854775808 -37760 0 LMT}.. {-2177415040 -38400 0 -1040}.. {307622400 -36000 0 -10}.. {788868000 50400 0 +14}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):394
                                                                                                                                                                                          Entropy (8bit):4.441317927120857
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB869nmdHlCTvrvCvKcHwzHHI/HKOjHHwZaLYkcy:2ecrrqvGznISknwZaLxcy
                                                                                                                                                                                          MD5:B489D7BDE8EB805B2A24726A6FB0C441
                                                                                                                                                                                          SHA1:7997A33AA56857EC52B1198DBEF4CE1DB50D69FD
                                                                                                                                                                                          SHA-256:B528E5E712E5F878603183E7CCFF55E5DB97CB47D7628BCB635342796317B899
                                                                                                                                                                                          SHA-512:4898AC2747FB8620BE29933CC7AA344AF1A3B7777D1AFF08BB4C6CE6E7AF205581937CCB488F3CB39CC8CA7FB42EDC8E1CAD8BADC9FCA40E3CAD23271CD66FCB
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Kosrae) {.. {-9223372036854775808 -47284 0 LMT}.. {-3944631116 39116 0 LMT}.. {-2177491916 39600 0 +11}.. {-1743678000 32400 0 +09}.. {-1606813200 39600 0 +11}.. {-1041418800 36000 0 +10}.. {-907408800 32400 0 +09}.. {-770634000 39600 0 +11}.. {-7988400 43200 0 +12}.. {915105600 39600 0 +11}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):304
                                                                                                                                                                                          Entropy (8bit):4.5947337310364835
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/yEyDm2OH4T2eoHvmfKnOjvScHrkL/Xy2185k0YAov:MB86XmmdHWCv6KOjHHgLN8tby
                                                                                                                                                                                          MD5:7D1FC9913941693ACBD6A3CCB2F34555
                                                                                                                                                                                          SHA1:D07C8AAED1DF9614BCA6EEF0F72FB98BE46CF5EF
                                                                                                                                                                                          SHA-256:38133BE70100D7DC244A680827879E6B240646C7C0B68F58652051E681A71985
                                                                                                                                                                                          SHA-512:419F0A1D1D71C8F84765C7B54271D7EFD6A81F428751523A214ABB24A8770DD5A7666F634A20AF97D5AAB8F21C0DEF23DCDE068CF4C1CCC7639ABC43864A9DBC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Kwajalein) {.. {-9223372036854775808 40160 0 LMT}.. {-2177492960 39600 0 +11}.. {-1041418800 36000 0 +10}.. {-907408800 32400 0 +09}.. {-817462800 39600 0 +11}.. {-7988400 -43200 0 -12}.. {745934400 43200 0 +12}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):333
                                                                                                                                                                                          Entropy (8bit):4.49621343701744
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/QpDm2OHyexYoHvmf/aHwzvScHoVv3HKnOjvScHr8e0LYX0YAov:MB86cmdHyuYCvMiHwzHHI/HKOjHHYe0I
                                                                                                                                                                                          MD5:CA7ED52987F13BA6A3043C324F72C3D0
                                                                                                                                                                                          SHA1:F5798473DB3A9AA588E5F0D772AD2145A90DE707
                                                                                                                                                                                          SHA-256:67EA1A2A84E0FA686C04EF327E7EEACCC15E21BED79A801E64BB57FE4184509A
                                                                                                                                                                                          SHA-512:4EA25564E1430615D0FE75319B3CFC88E3FB7BCE026B4C59842FC513CBE7BFF3AD39CC283ED88DD7292DFE8185ACECD5E1ED0D5997F27082F3F6B2D1317D86C3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Majuro) {.. {-9223372036854775808 41088 0 LMT}.. {-2177493888 39600 0 +11}.. {-1743678000 32400 0 +09}.. {-1606813200 39600 0 +11}.. {-1041418800 36000 0 +10}.. {-907408800 32400 0 +09}.. {-818067600 39600 0 +11}.. {-7988400 43200 0 +12}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):159
                                                                                                                                                                                          Entropy (8bit):4.976348164850869
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/nUDHzrHeWNMXGm2OHOx5oHsdNpNFvvIVVFvYy:SlSWB9eg/cHeSDm2OHOnoH4/FvQVVFAy
                                                                                                                                                                                          MD5:80CB45F42BAB1AA72CD7C7BC394DF3F8
                                                                                                                                                                                          SHA1:8B5ED2BCCA1AEB41F22AFD14F46533959828B2BE
                                                                                                                                                                                          SHA-256:AE0B5055C6E57516F23749B13681205EAD376E682959716A457B1377AF8160BA
                                                                                                                                                                                          SHA-512:71562E340B7A96B91D04FCBCAF71B66EA725CA1BD1094343C4442F8F9A8C67A3BE378034849197407D21C3EE74E2C753B1FD3BAFF2378714B993AD9336236A0E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Marquesas) {.. {-9223372036854775808 -33480 0 LMT}.. {-1806676920 -34200 0 -0930}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):194
                                                                                                                                                                                          Entropy (8bit):4.81307101485774
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQGurKeTnXHAIgObTurKefVHRL/nUDHz0HvUDHurKv:SlSWB9vsM3yciemHAIgObiecN/Zevn
                                                                                                                                                                                          MD5:13CE48F8FF74BFCEFCB8D217D6357E38
                                                                                                                                                                                          SHA1:296D31E3F868934C6EB34BF1BF4C23F3E1839294
                                                                                                                                                                                          SHA-256:F62C6A2DEC1E9EC78115D5F14E5B9DB7C86F788662D2E68F7E6714F4A05DC974
                                                                                                                                                                                          SHA-512:778813FC08EF803743F392000BECE73C1C079883DAFC26FAC0AF8FA3FA4AE1D94BA8F3CAA5E82DD4DB1A5F12AD49E123901908F5483E0E325952622AB4C4A26A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Pago_Pago)]} {.. LoadTimeZoneFile Pacific/Pago_Pago..}..set TZData(:Pacific/Midway) $TZData(:Pacific/Pago_Pago)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):244
                                                                                                                                                                                          Entropy (8bit):4.702705620563736
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/JdDm2OHceoHx6sCH/ZdqvScH9cd0YAov:MB86J5mdH9CMhcHHauby
                                                                                                                                                                                          MD5:30A8285FCCE2E98889E53DF60B906C3D
                                                                                                                                                                                          SHA1:C7789CB11A2C8FE3861FF3C0A7A41F6CAFD87631
                                                                                                                                                                                          SHA-256:22C367F3219B5FC736260D9DBFEF5FCB767F1A6BDA991C9352F790A3D1FFE884
                                                                                                                                                                                          SHA-512:02DA82680588839B06F820979AECC78B7FBEAB9D6D49176B513B80F1C8BA2D55FB3674B19EFDD574EE6FC01539EF7C3081A4B34D14A54DACF367D816B62E5843
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Nauru) {.. {-9223372036854775808 40060 0 LMT}.. {-1545131260 41400 0 +1130}.. {-862918200 32400 0 +09}.. {-767350800 41400 0 +1130}.. {287418600 43200 0 +12}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):184
                                                                                                                                                                                          Entropy (8bit):4.846897598147338
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/nUDHwMQA3WNMXGm2OH0SNoHoRWVGXyOyovFaSUGFAZvBByV:SlSWB9eg/Jm3SDm2OHJoHFGXCodZUGFd
                                                                                                                                                                                          MD5:6E8EC957423917AE7A7EF503661C1A77
                                                                                                                                                                                          SHA1:B4FA3C3E3F96C28B7DB87BFD441D2EE99CC81B6F
                                                                                                                                                                                          SHA-256:869CCA656BE88E4E7481C75737C3656BAB6924AD1751505815AC719C59269842
                                                                                                                                                                                          SHA-512:9047ABE673259699C7A548BC7B5636DD646DD382C751B796522F65404162AB1B0BB022FD274653921E5B23C847EE248AEF6749E15ED2CFC1DCE35BBA294D8251
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Niue) {.. {-9223372036854775808 -40780 0 LMT}.. {-543069620 -40800 0 -1120}.. {-173623200 -39600 0 -11}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):5139
                                                                                                                                                                                          Entropy (8bit):3.65794255179185
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:K/yg8hZbeS07HbbYTqge+gDrWnAxhejtB0e+Pwn1UVimqNQrKvyXrStkCDv:K/y7hNeS07sq0Erk10lINQrKvyXrwv
                                                                                                                                                                                          MD5:E19700A894AA64715D14F501D8D2FA98
                                                                                                                                                                                          SHA1:57CFC96E2EBB985720DB290F59181860AF2AC1AA
                                                                                                                                                                                          SHA-256:5D16C3EF1DB996C1B8E33AD884C33946F77DA872F35F41EC3BD5B288F43CC9AF
                                                                                                                                                                                          SHA-512:E11EAF2A7B217CDBEECB57635184F04171F0DB088FCC4702AA8D40A3A5453904592F5869849913E2EB02DC5941C84203A76D270E8930B0B691A3B9C39B78BF30
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Norfolk) {.. {-9223372036854775808 40312 0 LMT}.. {-2177493112 40320 0 +1112}.. {-599656320 41400 0 +1130}.. {152029800 45000 1 +1230}.. {162916200 41400 0 +1130}.. {1443882600 39600 0 +11}.. {1561899600 39600 0 +12}.. {1570287600 43200 1 +12}.. {1586012400 39600 0 +12}.. {1601737200 43200 1 +12}.. {1617462000 39600 0 +12}.. {1633186800 43200 1 +12}.. {1648911600 39600 0 +12}.. {1664636400 43200 1 +12}.. {1680361200 39600 0 +12}.. {1696086000 43200 1 +12}.. {1712415600 39600 0 +12}.. {1728140400 43200 1 +12}.. {1743865200 39600 0 +12}.. {1759590000 43200 1 +12}.. {1775314800 39600 0 +12}.. {1791039600 43200 1 +12}.. {1806764400 39600 0 +12}.. {1822489200 43200 1 +12}.. {1838214000 39600 0 +12}.. {1853938800 43200 1 +12}.. {1869663600 39600 0 +12}.. {1885993200 43200 1 +12}.. {1901718000 39600 0 +12}.. {1917442800 43200 1 +12}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):326
                                                                                                                                                                                          Entropy (8bit):4.531117764974758
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/JcSDm2OHTYoHgnX2czO/FxgV62JFy:MB86JcGmdHTYCgX2czUjgM2ny
                                                                                                                                                                                          MD5:2F1E92A11DF44C72DC305C13111DEA35
                                                                                                                                                                                          SHA1:847F551C3D6C75CD2D0D6D87FCF3294CA8DD90B2
                                                                                                                                                                                          SHA-256:238683C027D2319C33D975A837E9FC9D24DD53B1A67108EDBF7ABDF0DB050881
                                                                                                                                                                                          SHA-512:E35D8C71AFDBB9A7507E873925001AEDE3734B1D235F509D19952E85279CBCC233A73412EA1F79CB534A45D36FEAA8AFDA98D9964DC93C7892B318F4AFC9A076
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Noumea) {.. {-9223372036854775808 39948 0 LMT}.. {-1829387148 39600 0 +11}.. {250002000 43200 1 +11}.. {257342400 39600 0 +11}.. {281451600 43200 1 +11}.. {288878400 39600 0 +11}.. {849366000 43200 1 +11}.. {857228400 39600 0 +11}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):188
                                                                                                                                                                                          Entropy (8bit):4.985607855830399
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/nUDHurKeTFfXMXGm2OH2ivkeoHvUPi1TsYoHsdfWTVvvVFv:SlSWB9eg/XecDm2OH23eoHvWieYoHiWB
                                                                                                                                                                                          MD5:E86D90DAA694B0EAC42F8C01346BC95B
                                                                                                                                                                                          SHA1:CD29DEFC291C939296E86DC7EF5D0654D85285E8
                                                                                                                                                                                          SHA-256:CCA96640AB3BC707224FA86D9AF66F9D53A204A97B370B2785BA8208688BF8B6
                                                                                                                                                                                          SHA-512:937BA420061E3781F831779B458E914A0FC465C4B41796F8B7CB1E548822F5777A6450FC6002AB13EBC5C9F54E374D3ED731D05B2B302B95359BE34094E5062B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Pago_Pago) {.. {-9223372036854775808 45432 0 LMT}.. {-2445424632 -40968 0 LMT}.. {-1861879032 -39600 0 SST}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):183
                                                                                                                                                                                          Entropy (8bit):4.919381181565273
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/nUDHugEZF3fMXGm2OHKvkeoHucRbgnJnoHvmdQ4+vScFAy:SlSWB9eg/Xg2PDm2OHK8eoHTWJnoHvmi
                                                                                                                                                                                          MD5:2E6C7EC61C7E29A147475C223B163F6B
                                                                                                                                                                                          SHA1:3A98D3441335224E7EBC0648990BCA1DE3BDF5C6
                                                                                                                                                                                          SHA-256:97DE6C2C717BFEAD00F83B5D39D654C32CEE580226F5F084484EBAD57BBCE7FF
                                                                                                                                                                                          SHA-512:5868C43966DDEBA8EC4BBBB29CDFDDFF0C7B01FD4D579FF655F3363029059F969B39C9221190672B6A2F7938583594AA0B103FC2A7ED573E2BC1C3A1623DE8DD
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Palau) {.. {-9223372036854775808 -54124 0 LMT}.. {-3944624276 32276 0 LMT}.. {-2177485076 32400 0 +09}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):188
                                                                                                                                                                                          Entropy (8bit):4.809907977056877
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/nUDHuQTWLMbNMXGm2OHUVFvoHvmXUlgloWkcyf/vGpn:SlSWB9eg/XQyLMJDm2OHUVVoHvmXUKm2
                                                                                                                                                                                          MD5:3F4987676F9C461895EDF9985AD22E06
                                                                                                                                                                                          SHA1:A96E470209010B837EF5BB3AC93BAE74BF2CCF64
                                                                                                                                                                                          SHA-256:5D363729A986E24C79F4B817CC88D2B22ACCCE3ADD20138D51C4422C4297AD6F
                                                                                                                                                                                          SHA-512:988FB98EFD3F57F5D66A932CC6B9D0387E9B0951FC590E08DAF19ACF5E4F39BC1B25265F16E14930BCF394902F5F0EF507E0E91C98902DFB10FA16D716091AB0
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Pitcairn) {.. {-9223372036854775808 -31220 0 LMT}.. {-2177421580 -30600 0 -0830}.. {893665800 -28800 0 -08}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):338
                                                                                                                                                                                          Entropy (8bit):4.55704384204571
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9eg/XyiDm2OHANgYoHT6WKNoHvmScHwzvScHoVv3HKnOjvScHb0Zzy:MB86C2mdH1YCT61NCvfcHwzHHI/HKOjX
                                                                                                                                                                                          MD5:497B7BE4CE7A51C19CE7D4DDC3109281
                                                                                                                                                                                          SHA1:5ED794E3B95A99CF1B9520174A15396A3A8ADF28
                                                                                                                                                                                          SHA-256:88D62B644BB96A9318427B4CA56DB37C8217DA449328C801ED77007BE9420F9C
                                                                                                                                                                                          SHA-512:2E0898F7135E1634298BD5DE73F129433F9DA47E6F08E5A58D83A4DF4F6FC0F54B6FC2660B0EE4C13561A925841B160B893D4A21A0622125D2E3DC66883C5080
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Pohnpei) {.. {-9223372036854775808 -48428 0 LMT}.. {-3944629972 37972 0 LMT}.. {-2177490772 39600 0 +11}.. {-1743678000 32400 0 +09}.. {-1606813200 39600 0 +11}.. {-1041418800 36000 0 +10}.. {-907408800 32400 0 +09}.. {-770634000 39600 0 +11}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):188
                                                                                                                                                                                          Entropy (8bit):4.786230343954939
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQGuySeyXHAIgObTuyoAFARL/nUDHu3HppUDHuyB:SlSWB9vsM3yciySeSHAIgObiyJAN/X3y
                                                                                                                                                                                          MD5:D32F290A7020C13D7A130A0548112B02
                                                                                                                                                                                          SHA1:314877B3C316D7BD9962DE18A9D57A59556E0D95
                                                                                                                                                                                          SHA-256:EDC43EF78691A1B22D111BC4390EA442B893E61771A6FD76BDAE1D46C5904C0C
                                                                                                                                                                                          SHA-512:9054C22EA382CACE946FE08F0118E2A4120DE4FF1F3FA908869E4BFA20D2DF8AED0DD5F169871BD09743563639F6E24C7DB8BBFB3A7268DE15DB7CCAFE622192
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Pohnpei)]} {.. LoadTimeZoneFile Pacific/Pohnpei..}..set TZData(:Pacific/Ponape) $TZData(:Pacific/Pohnpei)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):190
                                                                                                                                                                                          Entropy (8bit):4.945354510868153
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/nUDHuwKXI3SMXGm2OHwdvoHvZUeQTnoo3v/vnqMVVMUMy:SlSWB9eg/X/43SDm2OHwdvoHvZZQTnoQ
                                                                                                                                                                                          MD5:2CFB7C2A3D26D7AF0F6AE32ADD81C364
                                                                                                                                                                                          SHA1:80C96E50D23A9A9531E4EE33744CF445C054B901
                                                                                                                                                                                          SHA-256:124C137B091D9D54D5E0579131485428FAAE040ACC978D20D6A8C8E4DE9889AA
                                                                                                                                                                                          SHA-512:A215FF5A69BD3E786BD3F8C952C8593396402EFA85005F5342093028617A6862EAE8BFD7B6D5737F90D90897AB62CF785544A4157A222AE4D0F70797FFBEC2CB
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Port_Moresby) {.. {-9223372036854775808 35320 0 LMT}.. {-2840176120 35312 0 PMMT}.. {-2366790512 36000 0 +10}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):969
                                                                                                                                                                                          Entropy (8bit):3.943959457262612
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB86VrjmdHI5Cvn9HCFkN00hjNFq++UE+q0hwA+A7VxVnDEFn:IeZv8w0MNFq+xE+uAtx1c
                                                                                                                                                                                          MD5:64AD3A103F4D145C48484BF8FACF41C2
                                                                                                                                                                                          SHA1:40C00CFA56C87E506C254A93A164D7227DFF3BD5
                                                                                                                                                                                          SHA-256:5AB006A686E564E30C94884FF8A9D728AEC74681DA8772E9722B6FE203630B5D
                                                                                                                                                                                          SHA-512:D1088C3B673B5456A8706B69BE4D7AB18615EE53A82BF4ABE76E86700837E6BAD0BD79C13EDA9B04776B08A95B835BA755AA565F86E45BFE507E8783896C1EE2
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Rarotonga) {.. {-9223372036854775808 48056 0 LMT}.. {-2209555256 -38344 0 LMT}.. {-543072056 -37800 0 -1030}.. {279714600 -34200 0 -10}.. {289387800 -36000 0 -10}.. {309952800 -34200 1 -10}.. {320837400 -36000 0 -10}.. {341402400 -34200 1 -10}.. {352287000 -36000 0 -10}.. {372852000 -34200 1 -10}.. {384341400 -36000 0 -10}.. {404906400 -34200 1 -10}.. {415791000 -36000 0 -10}.. {436356000 -34200 1 -10}.. {447240600 -36000 0 -10}.. {467805600 -34200 1 -10}.. {478690200 -36000 0 -10}.. {499255200 -34200 1 -10}.. {510139800 -36000 0 -10}.. {530704800 -34200 1 -10}.. {541589400 -36000 0 -10}.. {562154400 -34200 1 -10}.. {573643800 -36000 0 -10}.. {594208800 -34200 1 -10}.. {605093400 -36000 0 -10}.. {625658400 -34200 1 -10}.. {636543000 -36000 0 -10}.. {657108000 -34200 1 -10}.. {667992600 -36000 0 -10}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):179
                                                                                                                                                                                          Entropy (8bit):4.854594370903023
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG5RFeyXHAIgObT5RV5RL/nUDHtluKpUDH5Rgn:SlSWB9vsM3ycdeSHAIgOb7N/vKbn
                                                                                                                                                                                          MD5:EFC985F07B24BEDA22993C9D0EA7E022
                                                                                                                                                                                          SHA1:6D05D12925621F1D05999A5DCC81B8C6F4D18945
                                                                                                                                                                                          SHA-256:4F6A1C20A11E186012466091CD4B3C09D89D35E7560F93874DEC2D7F99365589
                                                                                                                                                                                          SHA-512:5FB4D8784D2EB8AEF660D6CBC7C403561EE5874BEC0439762F3688C64830B52B1F557B467CA65B64B1210E82F385E134BF676F3CA443FB480702A2C90B3C3757
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Guam)]} {.. LoadTimeZoneFile Pacific/Guam..}..set TZData(:Pacific/Saipan) $TZData(:Pacific/Guam)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):193
                                                                                                                                                                                          Entropy (8bit):4.78073436515702
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQGurKeTnXHAIgObTurKefVHRL/nUDHthA5nUDHurK:SlSWB9vsM3yciemHAIgObiecN/NXevn
                                                                                                                                                                                          MD5:8E335F5D0A2082BB673E7FEB56167A89
                                                                                                                                                                                          SHA1:EF37235922D4477AC9B3D9576888CDE41E700741
                                                                                                                                                                                          SHA-256:98D06302EFC18FAD7751F7E5A059FE4ABAFBC361FDC365FE1EB576209D92C658
                                                                                                                                                                                          SHA-512:2572D99EE8BAF264B8A2EF3D7647D33A387EE83E036F9E7BDB21F64C2FCB43317AF9C899C8CDD822A2A5A207EF17504E71B217370473ED95AE925BBA2CFA90F9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Pago_Pago)]} {.. LoadTimeZoneFile Pacific/Pago_Pago..}..set TZData(:Pacific/Samoa) $TZData(:Pacific/Pago_Pago)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):154
                                                                                                                                                                                          Entropy (8bit):4.946903999617555
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/nUDHqhFPMXGm2OHl/oeoHsdNqRU7vV:SlSWB9eg/TTPDm2OHloeoH4qRW9
                                                                                                                                                                                          MD5:341B0F535043051A91A21297BFA39DC0
                                                                                                                                                                                          SHA1:6AD9177FC237503E6D36DE5408790A68D5D36E2C
                                                                                                                                                                                          SHA-256:440A87DDB4F304DCBEAED1B0DE8F6058840E597918B688E0782F584DA03B1BBC
                                                                                                                                                                                          SHA-512:D97D399A0F1B4347F8AE5F15E43A8787697339AB0EFB4E1106C790528FFC529ADC5B44B231D95449D39DB464D84A5DDF7B61E7D190E3E2B0091D1EC204B530A2
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Tahiti) {.. {-9223372036854775808 -35896 0 LMT}.. {-1806674504 -36000 0 -10}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):152
                                                                                                                                                                                          Entropy (8bit):4.969953728206455
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/nUDHqQ3fMXGm2OHyyFpoeoHvmciRrWFN0UIoAov:SlSWB9eg/T+Dm2OHyyFGeoHvmbu0YAov
                                                                                                                                                                                          MD5:AA67FBBB6A02F5B30486C54E3A5C11D7
                                                                                                                                                                                          SHA1:C64FD3654A47A0ECDD681B8A4D9B621AC6D97DBE
                                                                                                                                                                                          SHA-256:91AA5DA8D5D1E72B1F561D0AEAB4B07E02EDD4EB95AE8C9F1C503C820460599F
                                                                                                                                                                                          SHA-512:FC170904098011C091622A263CA554CEE952D64888D3573EB324E0A262E1A0C0885C059429F0FFF9219FEB8F1B6B97EC34661DD8DD547124D0C6C0A1C8EE24B7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Tarawa) {.. {-9223372036854775808 41524 0 LMT}.. {-2177494324 43200 0 +12}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):451
                                                                                                                                                                                          Entropy (8bit):4.343299747430587
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12:MB86PmdHmCdC/V7XZXw8Ut2rbUtGiAUtb4bUtqVy:iemn/VbKeOSy
                                                                                                                                                                                          MD5:87CFDA2399A8126117E5BFC018B06518
                                                                                                                                                                                          SHA1:6291611BCFB34293F9C20BA77170A13C1502C2ED
                                                                                                                                                                                          SHA-256:ECC9D2E7AD7B5E5D6599CF442941595C99C4D69E802A4DDB4DA321898CDDE91D
                                                                                                                                                                                          SHA-512:846FE07FEB82EC5F87FAE137D23074934246DBB7C7EE30F44F6C5373183B5FD2211B58E5CF1AB9A47938D282CA322FBDE80B58054FE6517CDC549992439F19A8
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Tongatapu) {.. {-9223372036854775808 44352 0 LMT}.. {-767189952 44400 0 +1220}.. {-284041200 46800 0 +13}.. {915102000 46800 0 +13}.. {939214800 50400 1 +13}.. {953384400 46800 0 +13}.. {973342800 50400 1 +13}.. {980596800 46800 0 +13}.. {1004792400 50400 1 +13}.. {1012046400 46800 0 +13}.. {1478350800 50400 1 +13}.. {1484398800 46800 0 +13}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):180
                                                                                                                                                                                          Entropy (8bit):4.913386161054243
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG9CoveyXHAIgObT9CuYFARL/nUDHqAOsvUDH9Coy:SlSWB9vsM3yckGeSHAIgObkXFAN/TAO2
                                                                                                                                                                                          MD5:643A77CAA5D7E031418C150A2D114BC4
                                                                                                                                                                                          SHA1:BE00B59D7AEB6AAB871D87A1C6243233833C4539
                                                                                                                                                                                          SHA-256:BDD8C779AF9D671AD7F20832FFF8EB3B25C9989A619C23337743F112FF4C8764
                                                                                                                                                                                          SHA-512:1CC7BFC35FB4FFE9517F0E6C9CA52E4FC71BFBA9E85F77773E490BCB3EF5F0C041E3C24A08A9A39F749161AB6F4027F703A254CF6158C1AC31E9CFBDBAAA2A45
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Chuuk)]} {.. LoadTimeZoneFile Pacific/Chuuk..}..set TZData(:Pacific/Truk) $TZData(:Pacific/Chuuk)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):150
                                                                                                                                                                                          Entropy (8bit):4.981440234973766
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/nUDHpDFNMXGm2OH4VkxYoHvmcDVv0UIoAov:SlSWB9eg/8Dm2OHYkxYoHvmyv0YAov
                                                                                                                                                                                          MD5:11F5DFD4F782517FAEFBB7D7FEF3CED6
                                                                                                                                                                                          SHA1:B511E65FCB17E8910E347DE1C94B5BCF1A9A6081
                                                                                                                                                                                          SHA-256:2D18D9AB10C9D8947A88D486D0BC0B0523049A2ED2CA2FBDFA0577E40F189D13
                                                                                                                                                                                          SHA-512:0F72C4ACF54758B61ECC4584B86C0257178D0A82C98076C56B417DC4D0CB6743FD1D47E5DBC5EE9635E8297704C86F6841DB4704706C96F89F47D0CE55883230
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Wake) {.. {-9223372036854775808 39988 0 LMT}.. {-2177492788 43200 0 +12}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):152
                                                                                                                                                                                          Entropy (8bit):4.977211872736631
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QF08x/nUDHpEYdNMXGm2OH3UPoHvmcCRQH0UIoAov:SlSWB9eg/tiDm2OHkPoHvmiH0YAov
                                                                                                                                                                                          MD5:DA5CFD5BFC06355B732CAFB11B2BBBCA
                                                                                                                                                                                          SHA1:5AA3838C8799CE33D261331971E42494E2A88041
                                                                                                                                                                                          SHA-256:A3D83E6C504EAC75C4CD87B696F0DF2703D0A78DF27D8B1FAC161ACB07F2A9DE
                                                                                                                                                                                          SHA-512:95444BDD838DAF8C4B70BFE0345C7437DF5E1FA8BF3C8E4AD43C3F9887B2B4A1885E8EDDBE5EF7306BEBFBF597A662603001A5EF4144F204A6EDAB9A5D671EC0
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:Pacific/Wallis) {.. {-9223372036854775808 44120 0 LMT}.. {-2177496920 43200 0 +12}..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):179
                                                                                                                                                                                          Entropy (8bit):4.935135597072032
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG9CoveyXHAIgObT9CuYFARL/nUDHnHPUDH9Coy:SlSWB9vsM3yckGeSHAIgObkXFAN/eBl
                                                                                                                                                                                          MD5:BF20184F9BBBE1E43490F93E97DA202D
                                                                                                                                                                                          SHA1:D44B0A82DCE2131BDB52BFE70B8B59F412551B52
                                                                                                                                                                                          SHA-256:E348A2D02966CF9599B5F6F1F5B6C3412113DEF548BD322F0C22376106E12D92
                                                                                                                                                                                          SHA-512:C1BA813BB3F8628866C1042669051C2763FD2B13CA724CB91F0BEC0CF97D77FFF353157036C789D3589238D7FC013FB61248356CFB8D14C54D9EE525AF2D1331
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Chuuk)]} {.. LoadTimeZoneFile Pacific/Chuuk..}..set TZData(:Pacific/Yap) $TZData(:Pacific/Chuuk)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):174
                                                                                                                                                                                          Entropy (8bit):4.940195299412468
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVqEGIV5XHAIgoqpEGYvWARL/nSi67x/yQa0EGIy:SlSWB9vsM3ymc4HAIgocVAN/27x6qF
                                                                                                                                                                                          MD5:E6AA2F6A05B57AA9B4AEF8E98552EEB2
                                                                                                                                                                                          SHA1:22470C204152702D8826CA52299E942F572C85ED
                                                                                                                                                                                          SHA-256:C27E1179B55BF0C7DB6F1C334C0C20C4AFA4DBB84DB6F46244B118F7EAB9C76E
                                                                                                                                                                                          SHA-512:B28A264907C32F848D356FB0F5776C2CE819DCB6BC08A5E2DCD4FA455EE1616966E816748079C7A55485BABFFB292D567E6F958168F945889E33A267B0E7EDA9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Warsaw)]} {.. LoadTimeZoneFile Europe/Warsaw..}..set TZData(:Poland) $TZData(:Europe/Warsaw)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):176
                                                                                                                                                                                          Entropy (8bit):4.9353841548970205
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVxMvLS3vXHAIgoqyMvLL6RL/nM24h8QavMvLBn:SlSWB9vsM3ymvMv2PHAIgovMvH6N/e8i
                                                                                                                                                                                          MD5:7D7BD6E40D3ADCA04754255D69B5CC9D
                                                                                                                                                                                          SHA1:EE32167B450DE7B0F1A15199795AEF9524BE623B
                                                                                                                                                                                          SHA-256:EFD666F3062D52C5D0B4F83B1A206E6840C1EAEC356CD77A0A71C7EDFA78C964
                                                                                                                                                                                          SHA-512:6056AAF078316A89079D19555F0BAEFB4C1CDBAA5426A8BEE76E0BFA5C69A5DAAFD199DEF978ABD67287AE1B80F754B7845EAFD5CC0995FE10E44D1F34D5435C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Lisbon)]} {.. LoadTimeZoneFile Europe/Lisbon..}..set TZData(:Portugal) $TZData(:Europe/Lisbon)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):165
                                                                                                                                                                                          Entropy (8bit):4.795776391333205
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8qMveyXHAIgNqBLFARL/lOr4WFKfMy:SlSWB9vsM3yKMveSHAIgcBJAN/S4wKfB
                                                                                                                                                                                          MD5:C5AE3A1DAD32C870651C74E367F604CF
                                                                                                                                                                                          SHA1:9FF81383C43D98441841E182BC783381EF565204
                                                                                                                                                                                          SHA-256:9AEC39777013B23D63D0509EBB2F01D57A2C1592264DBB19CE2C61C7D7DDD8DE
                                                                                                                                                                                          SHA-512:3A7217ED885011972262B71DB7F5D7E4C9C6E82B4BEEF0718BCB9452E49FDBDD5ED78564156577AB09150140B862E1944B4B739BCE0C50E63667050C35329503
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Taipei)]} {.. LoadTimeZoneFile Asia/Taipei..}..set TZData(:ROC) $TZData(:Asia/Taipei)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):162
                                                                                                                                                                                          Entropy (8bit):4.900717350092823
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq8ZQckovXHAIgNtvQMHRL/lmFeWFKKQ7:SlSWB9vsM3yJJHAIgbHN/pwKv
                                                                                                                                                                                          MD5:59E4C80F97FAFC92987B08BFA03B5EE5
                                                                                                                                                                                          SHA1:4F86FCE17A51C3789DEB887BE01A1A0E6EA3D2DE
                                                                                                                                                                                          SHA-256:63153B40225270ADB7CD248788CA9F18C6DEBAF222B3165BBAB633337592DF44
                                                                                                                                                                                          SHA-512:9FCC0F747096775D0FB8DD252A73E6F47C16BF2D7DB0C3FBDFD206EE57393276FB40F65C1441296AE2AC115CFEE11098474DF3FEF8EE1FABE139427A8991F052
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Seoul)]} {.. LoadTimeZoneFile Asia/Seoul..}..set TZData(:ROK) $TZData(:Asia/Seoul)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):180
                                                                                                                                                                                          Entropy (8bit):4.85623787837429
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyq801c3vXHAIgNtK1tyHRL/kZ8O5h4WFKf1z:SlSWB9vsM3yUgHAIgWv6N/kth4wKf9
                                                                                                                                                                                          MD5:5EABBAAF3B29B5DFF9E54136F7ABC654
                                                                                                                                                                                          SHA1:44615F03264012D97512F9AB386413DD72BE1090
                                                                                                                                                                                          SHA-256:B9443FB17F0128DDB9F2DF657DC5D2DF176F64C61B0D02B272E5DFB108537678
                                                                                                                                                                                          SHA-512:B930D637A1E69E0847ADDEAB013B2C25BC27EBB9CDF20B9CDDFDAC111E9F26BB5EBC83194E845ACC3E1B9A08C386C94FCC4FDE32292EB558E3F7463832BB38B9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Asia/Singapore)]} {.. LoadTimeZoneFile Asia/Singapore..}..set TZData(:Singapore) $TZData(:Asia/Singapore)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):201
                                                                                                                                                                                          Entropy (8bit):4.996391010176349
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSNJB9vsM3y7p5oeSHAIgppON/kjx+90ppv:JByMYbpwt8+90b
                                                                                                                                                                                          MD5:1AC81E2C60D528A6C5BF2E6867146813
                                                                                                                                                                                          SHA1:73D2D24FE6D56CA34ABF11B9A95DC22F809C5158
                                                                                                                                                                                          SHA-256:978C4E5256057CE7374AD7929605090FC749B55558495BD0112FB0BB743FA9C2
                                                                                                                                                                                          SHA-512:DB2673FB54C1308BBEB298A186F9130FB9090CE33B958C82D62B9BD88EE39BAB9A1BE40645547BA4167FD475892A323CF8EBA16C97F6FDF5693F1BF7A313FE9A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Puerto_Rico)]} {.. LoadTimeZoneFile America/Puerto_Rico..}..set TZData(:SystemV/AST4) $TZData(:America/Puerto_Rico)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):192
                                                                                                                                                                                          Entropy (8bit):4.9470542553730255
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFLLJJT8QFtFb+MuUyqx02NEO/vXHAIg202NEqA6RL/kRDwh4IAcGE2NEOyn:SlSNJB9vsM3y7UEOXHAIgpUEqA6N/k+H
                                                                                                                                                                                          MD5:2AB4B896957F26B114A990F69989F3FB
                                                                                                                                                                                          SHA1:8048C99F5EE02C021F311709B30EB28D650D884D
                                                                                                                                                                                          SHA-256:0114C111F5BCD838A28F2E16E01ECB79D8AFC8CBF639A672889ED0D692FC6CDC
                                                                                                                                                                                          SHA-512:353744359CD94B1E8184A8B83F762459C69D3AEEA43DA638C1F4CC34E01E9D86C2EBCF7F7BFD059CB23B64051510D1C4556A49D180F8A92DE8449139194DCDC9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Halifax)]} {.. LoadTimeZoneFile America/Halifax..}..set TZData(:SystemV/AST4ADT) $TZData(:America/Halifax)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):186
                                                                                                                                                                                          Entropy (8bit):4.957831162100758
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFLLJJT8QFtFb+MuUyqx0sAzE5Y5XHAIg20sAzEo5RL/kR/eIAcGEsAzEpv:SlSNJB9vsM3y7hzi2HAIgphznN/kc90q
                                                                                                                                                                                          MD5:3EC0B09EAB848821D48849673B24401C
                                                                                                                                                                                          SHA1:41599CBA78E124A7DA9744D2B4EA8CDC10008E0B
                                                                                                                                                                                          SHA-256:30428B85B37898AD98B65BE5B6A8BD599331D9A1B49605FC6521464228E32F8F
                                                                                                                                                                                          SHA-512:9A3303B3338C01B281A40BB48B93C446ADB92BBDC45371667F09EDA92F9EE2AEC60CE8E98CE15C0112B823799C76AEF14895B15DC997DA506494D75BBE58D662
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Regina)]} {.. LoadTimeZoneFile America/Regina..}..set TZData(:SystemV/CST6) $TZData(:America/Regina)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):192
                                                                                                                                                                                          Entropy (8bit):4.975428048518589
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFLLJJT8QFtFb+MuUyqx096yXHAIg20961yHRL/kRwx/h4IAcGE967:SlSNJB9vsM3y796SHAIgp9616N/kyxpQ
                                                                                                                                                                                          MD5:D85CCC5EFAA1ED549D02F09A38A53C68
                                                                                                                                                                                          SHA1:642ED571E4C6F60A953D42DA4F756F2262E4E709
                                                                                                                                                                                          SHA-256:44BEF7D4660A9A873EB762E3FDC651D31D97893545DE643FA1B2D05991C090A1
                                                                                                                                                                                          SHA-512:3CC6A14A17EA4833958A7D444073D6C2709FD61BF54387E5C362151E9143F795B2432B621080DD53E0FC9BDD7C58F406E046E3D0A2BBA4132D99E7C705E6D645
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Chicago)]} {.. LoadTimeZoneFile America/Chicago..}..set TZData(:SystemV/CST6CDT) $TZData(:America/Chicago)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):204
                                                                                                                                                                                          Entropy (8bit):4.928128138328689
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSNJB9vsM3y73G7JHAIgp3GZRN/kkp4903G8:JByMY3G7Kp3GntVp4903G8
                                                                                                                                                                                          MD5:506D15E2F37F501F5A592154142A5296
                                                                                                                                                                                          SHA1:5ACA12E0BA0FFF9734ED978A9C60AAA9D1E05A59
                                                                                                                                                                                          SHA-256:798F92E5DDA65818C887750016D19E6EE9445ADFE0FCB7ACB11281293A09C2C7
                                                                                                                                                                                          SHA-512:2EE08D39461CAD3492BE88B421BA463B4CEB8497F036518794BCF605F477057FEA218A9DFBB6335A28A5120750EA06AED9D2EA84CD0007D34CDE562DCD79CC0C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Indianapolis)]} {.. LoadTimeZoneFile America/Indianapolis..}..set TZData(:SystemV/EST5) $TZData(:America/Indianapolis)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):195
                                                                                                                                                                                          Entropy (8bit):5.113680059406992
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSNJB9vsM3y71RHAIgp1aAN/krp4901Yn:JByMY4pltw+90q
                                                                                                                                                                                          MD5:AAD8EF3067E97785D4052B80F5C4ACE1
                                                                                                                                                                                          SHA1:3EF0A06FCC41119F4A60A32CED0E5A1E0E8B4300
                                                                                                                                                                                          SHA-256:D159140114A13C69F073CFE9AD0B67D713E8811CBFF773A3D1681FC38EA0E699
                                                                                                                                                                                          SHA-512:A8774ADF6818D85476A6C147A45E55B338F413CD9B61BF9FDB0CB7A335C0CE8F8C6D1970783FEFECC2CE18388DF91304CB295BD4DFD29FB538D74F6A414A441D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/New_York)]} {.. LoadTimeZoneFile America/New_York..}..set TZData(:SystemV/EST5EDT) $TZData(:America/New_York)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):193
                                                                                                                                                                                          Entropy (8bit):4.9733028894475195
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSNJB9vsM3yc6e8SHAIgOb6eKAN/kQmrheo:JByMdniinbtRTo
                                                                                                                                                                                          MD5:458061B3F3C8F06C61B5726393A26BA2
                                                                                                                                                                                          SHA1:E894F5615654D1110C9964B8F6A54C048442D8EB
                                                                                                                                                                                          SHA-256:BF62C8650BBA258000F62F16B0C7CBB66F4FD63F8CFDAF54273BB88A02A6C8D6
                                                                                                                                                                                          SHA-512:6A161A7AE44CBF8CE4C704C94456A5B714AAF2A3FAF30731254C9FE056F9DDF207119D516CC6A4C44AE76EC078F5C59F5EC6DD6701FAA3A36F061AF3953B7C7D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Honolulu)]} {.. LoadTimeZoneFile Pacific/Honolulu..}..set TZData(:SystemV/HST10) $TZData(:Pacific/Honolulu)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):189
                                                                                                                                                                                          Entropy (8bit):4.999038624718282
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFLLJJT8QFtFb+MuUyqx0utLaDovXHAIg20utLRYovHRL/kRgFfh4IAcGEuto:SlSNJB9vsM3y7OBHAIgpONYyHN/kch4y
                                                                                                                                                                                          MD5:B06AB4998A57446FC4D5A5B986BCA0A9
                                                                                                                                                                                          SHA1:5E4A28466383CBAB2067B9B6D22882CF6D83C3FB
                                                                                                                                                                                          SHA-256:FEBE49FAE260E5595B6F1B21A0A3458D8A50ACA72F4551BF10C1EDB2758E0304
                                                                                                                                                                                          SHA-512:9E44174C4E348E1B768039585BA6393FD001B606E111092EEC57C75210A1E87BF3C72728321945D584CA60D4C848D88EB8B2F82CB88F38F90224A43FDCFEA9AA
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Phoenix)]} {.. LoadTimeZoneFile America/Phoenix..}..set TZData(:SystemV/MST7) $TZData(:America/Phoenix)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):189
                                                                                                                                                                                          Entropy (8bit):4.956231227702093
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFLLJJT8QFtFb+MuUyqx06RGFfXHAIg206RORL/kRMMFfh4IAcGE6RB:SlSNJB9vsM3y7+SPHAIgp+ON/kD490+B
                                                                                                                                                                                          MD5:5D3C1ADB8AC4EAC9E9A31734CD6884BD
                                                                                                                                                                                          SHA1:535B024EA088B9B192BE4206CBDD56BC5B163762
                                                                                                                                                                                          SHA-256:64556A7B20E425C79375C2A7CCF72B2B5223A7DE4FF4C99A5C039DB3456C63F6
                                                                                                                                                                                          SHA-512:FB799A42880613752AD6010D7B4E97ACCF7F6AE281D9A37057F6423AEF2607B608DB2AC52176F1653D8B2D086223C9658B101E73125F0FF7D6D9E8CD876EEC53
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Denver)]} {.. LoadTimeZoneFile America/Denver..}..set TZData(:SystemV/MST7MDT) $TZData(:America/Denver)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):192
                                                                                                                                                                                          Entropy (8bit):4.831981174214766
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFLLJJT8QFtFb+MuUyqTQGuQTWLM4YkovXHAIgObTuQTWLovFvHRL/kRQB5nv:SlSNJB9vsM3yciQyLM4YJHAIgObiQyLQ
                                                                                                                                                                                          MD5:B568B46A0207800D9C022BAB1E48709B
                                                                                                                                                                                          SHA1:71CE3F0E75E440D5BBA219BCBB92AF9C1F5A7466
                                                                                                                                                                                          SHA-256:0B8227AFC94082C985E8E125DF83E5EFADE7CD9CA399800D7B8E8B2BEAE22C7D
                                                                                                                                                                                          SHA-512:5067AAD0CD02EBDECA6980F9C7CCC80D076C34D6463C5B6B19B678D76B5E69C1C3639D046F56FE9D6255CBEA49189EDD735F66AD9EE2CB0389BE020E7ED3AD50
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Pitcairn)]} {.. LoadTimeZoneFile Pacific/Pitcairn..}..set TZData(:SystemV/PST8) $TZData(:Pacific/Pitcairn)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):204
                                                                                                                                                                                          Entropy (8bit):5.003766957083974
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSNJB9vsM3y7DvPHAIgp5N/kQ1p490Dy:JByMY8p5th090W
                                                                                                                                                                                          MD5:7E587175CA0F938C47FA920D787C57BD
                                                                                                                                                                                          SHA1:C3F7D8576C0AC74D6B70F4363EE2C174FADC70B0
                                                                                                                                                                                          SHA-256:D51D9549835E9C058F836C8952932CB53C10F7F194CD87452E9B13494D1C54C9
                                                                                                                                                                                          SHA-512:4460686AAA470F07A6DB1F8957FA4DB600E116273497F46E8A2D3FDECF622122DF753556B78C39FA2ADFDB2AF3C3ABB3C330ADA79B35C6A3CD8C498A0319CEE6
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Los_Angeles)]} {.. LoadTimeZoneFile America/Los_Angeles..}..set TZData(:SystemV/PST8PDT) $TZData(:America/Los_Angeles)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):189
                                                                                                                                                                                          Entropy (8bit):4.9524733332469095
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFLLJJT8QFtFb+MuUyqTQG5hB5WXHAIgObT5hByY6RL/kRKlUDH5hBpvn:SlSNJB9vsM3ycT2HAIgOboN/kNv
                                                                                                                                                                                          MD5:5970A466367825D72D9672293FCD4656
                                                                                                                                                                                          SHA1:1A736D61A6797295EEC8C094AED432171E98578E
                                                                                                                                                                                          SHA-256:55710EFDED5B5830B2F3A2A072037C5251E1766F318707ED7CD5EB03037FED43
                                                                                                                                                                                          SHA-512:1F2A1B2A7D0A3E410652546C174D9EC18C91C9327F11C384A0AA1EB12D7EFE85C4D53CA3C2A6C347C0068A4CE92A3138EB17232B0DEC88D52465C5DEDEEE6827
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Gambier)]} {.. LoadTimeZoneFile Pacific/Gambier..}..set TZData(:SystemV/YST9) $TZData(:Pacific/Gambier)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):198
                                                                                                                                                                                          Entropy (8bit):4.994125896811442
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSNJB9vsM3y7/9EtDSHAIgp/9Ef6N/kB490/9E9v:JByMY/947p/9XtN90/9s
                                                                                                                                                                                          MD5:560B18DFB138DAF821CFDAE017B94473
                                                                                                                                                                                          SHA1:0BB0312C742CC0097DF033656AE3D10723035C30
                                                                                                                                                                                          SHA-256:DA20018DE301F879E4F026405C69FA0370EB10184FE1C84A4F1504079D5DAFA1
                                                                                                                                                                                          SHA-512:B1D4EAD5F549E319DAD55EE67DAFD732E755164748C08633AA8F07C280B2CF617380D6F886304142D0E4D50026E63678DACFBE2DC809F780BA4CFF35A90DE906
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by ../tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Anchorage)]} {.. LoadTimeZoneFile America/Anchorage..}..set TZData(:SystemV/YST9YDT) $TZData(:America/Anchorage)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):180
                                                                                                                                                                                          Entropy (8bit):4.9295990493611495
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxV0XaDovXHAIgoq3XRFvHRL/jCl1yQaqXKv:SlSWB9vsM3ymQa2HAIgoQ/HN/SymKv
                                                                                                                                                                                          MD5:1FABF2DFD4BFD0184AE22ED76F7569E5
                                                                                                                                                                                          SHA1:5859266B26357B4FCADD7EC65847667631E303EB
                                                                                                                                                                                          SHA-256:8471A5575B9D9E47412D851A18A26C4405480540AABC8DAED5F81BE0C714C07C
                                                                                                                                                                                          SHA-512:1DCBECEF6D1F923E6C9CEA70CB10F1FF4E453265966AA88FBC8739E93EF40F8A16AAD85AF4ECC5CC1E52F22F49E5D3F4EE01A97DE2302FC4FBC063FE814F3851
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Istanbul)]} {.. LoadTimeZoneFile Europe/Istanbul..}..set TZData(:Turkey) $TZData(:Europe/Istanbul)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):153
                                                                                                                                                                                          Entropy (8bit):4.844017562912325
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqAxmS3vXHAIgELyHRL/iGMFfh8RFB:SlSWB9vsM3yzTHAIgm6N/iP8RX
                                                                                                                                                                                          MD5:DA060D2F397C978E0842631B4EC73376
                                                                                                                                                                                          SHA1:649BC85430B04662BE079C0AAD43DF5D5D499D28
                                                                                                                                                                                          SHA-256:356A9BB6F831971C295CF4DCE0F0CDC9EDF94FD686CA3D3195E5F031A0B67CBA
                                                                                                                                                                                          SHA-512:3359BFC6F0837D2DA9D72DA8053773CE0C1A1B1A47C33163BF38965E2104F57BC147F9EEC228A3591B75BF1BA93285AB83E8427E8E2E697AB18501DC017B6E6A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/UTC)]} {.. LoadTimeZoneFile Etc/UTC..}..set TZData(:UCT) $TZData(:Etc/UTC)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):189
                                                                                                                                                                                          Entropy (8bit):4.911775112130145
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0/VXEtDovXHAIg20/VXEfovRL/iOGl0IAcGE/VXEN:SlSWB9vsM3y7/9EtDSHAIgp/9Ef6N/i4
                                                                                                                                                                                          MD5:4379C0BF618649AA07CC4BDAC75F62EF
                                                                                                                                                                                          SHA1:7813B54BF2BD0C40A39CA9A29CC50C6D034880A3
                                                                                                                                                                                          SHA-256:CED56F09D68BE00555219594C7B2F3E7EFE8323201FB3E2AA0E1FA9A6467D5AF
                                                                                                                                                                                          SHA-512:AC822061F5C9743120A66E11C02B199253A40460A87F78DC154B0BDD91E410EDDA581E889F5D2A74670939034F39A7F6C7E814E038A1371DAB71EF79A8911AE7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Anchorage)]} {.. LoadTimeZoneFile America/Anchorage..}..set TZData(:US/Alaska) $TZData(:America/Anchorage)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):176
                                                                                                                                                                                          Entropy (8bit):4.8886795125313585
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0/yO5WXHAIg20/yOoNvWARL/iObMEIB/4IAcGE/y2:SlSWB9vsM3y7/yrHAIgp/yH0AN/itE8h
                                                                                                                                                                                          MD5:AB14CF1840CBDA2B326660DBD51273B4
                                                                                                                                                                                          SHA1:78144B3A2C75568307E4E86AE3B01EA7F541B011
                                                                                                                                                                                          SHA-256:A4F1398CF84D0AE09BF19288770756622D1710CCBFBFE79E0D3239497731287D
                                                                                                                                                                                          SHA-512:557A3ED9D1401E76291DC41524A1FD04AFF0829CEF66E103CEF9D10CD751F04FDEB6B7C0490302C71297F53AA8DC42930649AD274215D5DF068BCDE837E73756
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Adak)]} {.. LoadTimeZoneFile America/Adak..}..set TZData(:US/Aleutian) $TZData(:America/Adak)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):184
                                                                                                                                                                                          Entropy (8bit):4.9334626069754455
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0utLaDovXHAIg20utLRYovHRL/iQMfQfBx+IAcGEB:SlSWB9vsM3y7OBHAIgpONYyHN/iZfQfl
                                                                                                                                                                                          MD5:30ED80335BE37C7CBA672C33FDE23490
                                                                                                                                                                                          SHA1:B627E86F023FE02A5590FE8D55FF41946BE6D24B
                                                                                                                                                                                          SHA-256:9503403F231BA33415A5F2F0FDD3771CE7FF78534CE83C16A8DB5BC333B4AD8A
                                                                                                                                                                                          SHA-512:C1352612EC0B4FF2F6F279CDB6008D7E9DA7F94F0009EFD959AD3092393150ECA83A09E72C724E1A4BFC3A057B9218D54A87FFA1102E2D9BF058B78AC0A0B1AB
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Phoenix)]} {.. LoadTimeZoneFile America/Phoenix..}..set TZData(:US/Arizona) $TZData(:America/Phoenix)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):184
                                                                                                                                                                                          Entropy (8bit):4.90255068822036
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx096yXHAIg20961yHRL/ibXgox/h4IAcGE967:SlSWB9vsM3y796SHAIgp9616N/iB490+
                                                                                                                                                                                          MD5:7770A6B85B2FE73BCCE9D803E0200F23
                                                                                                                                                                                          SHA1:784AD1082FF1569961C2AC44F6D6F7605FBBE766
                                                                                                                                                                                          SHA-256:B6AC9FAE0AB69D58ECFD6B9A84F3C6D3E1A594E40CEEC94E2A0A7855781E173A
                                                                                                                                                                                          SHA-512:EEE79D37D77E6B80B91E8F30CE48B107371F6A58F0C91785E3C74EF210AE1011D0EB913113F1873BE6099B0BE1260410F0C74650446CB377F8FDB5505A44F266
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Chicago)]} {.. LoadTimeZoneFile America/Chicago..}..set TZData(:US/Central) $TZData(:America/Chicago)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):228
                                                                                                                                                                                          Entropy (8bit):4.7645631776966715
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y73GK7JHAIgp3GKZRN/i3E0903GK8:MByMY3GK7Kp3GKnti3t903GK8
                                                                                                                                                                                          MD5:96828B6BA17CA96723794F4B3744B494
                                                                                                                                                                                          SHA1:C3A824A925AEFE2A13A0E65548078D9842C2C7D7
                                                                                                                                                                                          SHA-256:5D86F8D36598516FB2342A18A87DB2701BABD265B0671CC9321C48DB22C7ECA5
                                                                                                                                                                                          SHA-512:2A27A455787DEAC3EC78A2784FB989DAB178E9D6DD7721CD3F5D3337231A3C651994B964D6CE040B7858E0127D7F70C0C48CB0D553D5B725B649C828288224B5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Indiana/Indianapolis)]} {.. LoadTimeZoneFile America/Indiana/Indianapolis..}..set TZData(:US/East-Indiana) $TZData(:America/Indiana/Indianapolis)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):187
                                                                                                                                                                                          Entropy (8bit):5.0345860115708785
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0wAy0vfXHAIg20wAyGWARL/i37oxp4IAcGEwAy0yn:SlSWB9vsM3y71RHAIgp1aAN/i37oxp4P
                                                                                                                                                                                          MD5:375DB249106C5D351CA0E84848835EDB
                                                                                                                                                                                          SHA1:ECC5C0C9DA68773B94C9013F4F1A8800D511CC4C
                                                                                                                                                                                          SHA-256:2FFCAD8CBEF5ECDC74DB3EE773E4B18ABC8EFA9C09C4EA8F3A45A08BADAF91A9
                                                                                                                                                                                          SHA-512:21550743BF4E1A79754F76AB201F0EB6BA6B265F43855901640054316A4A32A5D01D266B2441E4A6415720715A2ABD367D82E3D40949A7A66BE9F8366E47A8DD
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/New_York)]} {.. LoadTimeZoneFile America/New_York..}..set TZData(:US/Eastern) $TZData(:America/New_York)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):186
                                                                                                                                                                                          Entropy (8bit):4.88075715646936
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQG2fWGYFeyXHAIgObT2fWKARL/ioMN75nUDH2fWWv:SlSWB9vsM3yc6e8SHAIgOb6eKAN/ioER
                                                                                                                                                                                          MD5:C0475756CFEC302F737967468804846E
                                                                                                                                                                                          SHA1:85C13CA0A908C69B8BBB6040FC502AFF96B8F8C7
                                                                                                                                                                                          SHA-256:529BB43EFDA6C1584FEAEA789B590CEF1397E33457AB3845F3101B1FC126E0FB
                                                                                                                                                                                          SHA-512:D3FF374443344E8438D50803872E8A8EA077B2299B38C1BD155386B4D2C6008BBD0C0B0B26DE9680812D4AFC9A187B644BDCCB04C23880337228BCEC06D5D61B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Honolulu)]} {.. LoadTimeZoneFile Pacific/Honolulu..}..set TZData(:US/Hawaii) $TZData(:Pacific/Honolulu)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):206
                                                                                                                                                                                          Entropy (8bit):4.87340978435866
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:SlSWB9vsM3y73GKaHAIgp3GKIN/iGIfh4903GKT:MByMY3GKDp3GKItiBfh4903GKT
                                                                                                                                                                                          MD5:00AAFD60A0B1146274981FAB6336AFD9
                                                                                                                                                                                          SHA1:20AD47ED52874202585C90FE362663F060E064D3
                                                                                                                                                                                          SHA-256:5827B6A6D50CF0FB75D6BA6E36282591AD25E1F0BE636DCFC5D09BDA29A107FD
                                                                                                                                                                                          SHA-512:61113AB72B7D671D7B429106709E73DB57D5B8A382680BA37A54126C7F54BC2D6B47A2584177CE6B434793546DA7EB9B8B7DF9163816DBFC67C83D9930D6A158
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Indiana/Knox)]} {.. LoadTimeZoneFile America/Indiana/Knox..}..set TZData(:US/Indiana-Starke) $TZData(:America/Indiana/Knox)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):185
                                                                                                                                                                                          Entropy (8bit):4.83459089067994
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx06FQGFfXHAIg206FQJARL/iHaMCELMr4IAcGE6FQB:SlSWB9vsM3y74PFPHAIgp4KAN/iHaMHs
                                                                                                                                                                                          MD5:D955A5A943B203DC4B87A91ED196B82A
                                                                                                                                                                                          SHA1:C7ACC48AB2033C372C60C741F68B12FFAEA147DE
                                                                                                                                                                                          SHA-256:B4E4269C4FEBFEFF26750B297A590226C0A6872519A6BFDE36F6DC3F6F756349
                                                                                                                                                                                          SHA-512:445DC9A50487A4BA0A7F79078441696DCAA31F9988E5B515B5A827AC9275776B22DE303040900C1726EB99CABA8AD09E57AA674F798EA3FDEBC580E4B87D9439
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Detroit)]} {.. LoadTimeZoneFile America/Detroit..}..set TZData(:US/Michigan) $TZData(:America/Detroit)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):182
                                                                                                                                                                                          Entropy (8bit):4.892777905787396
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx06RGFfXHAIg206RORL/iBOlLo/4IAcGE6RB:SlSWB9vsM3y7+SPHAIgp+ON/iBY8/49Z
                                                                                                                                                                                          MD5:E53EDD55E6448C624DD03A8A100EF5AF
                                                                                                                                                                                          SHA1:1D266553CAFA23A3375CFAF7AFE6636553CC7B70
                                                                                                                                                                                          SHA-256:3763BF520D3C97148C34DCFBDF70DEC2636D4E38241555900C058EFEE3BD1256
                                                                                                                                                                                          SHA-512:B7FCF01DBB4231F30FEFA77C339B2CD7D984D6E6182F3BD15D6B64AC9525994E7CBF90C3F1F520FD22B54E19831B3CBAE1C22F04F60244C0C60A1809942422A4
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Denver)]} {.. LoadTimeZoneFile America/Denver..}..set TZData(:US/Mountain) $TZData(:America/Denver)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):196
                                                                                                                                                                                          Entropy (8bit):4.932311644026309
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0ydJg4o3vXHAIg20ydJPyHRL/iP+e2IAcGEydJgov:SlSWB9vsM3y7DvPHAIgp5N/ip290Dy
                                                                                                                                                                                          MD5:37AF94FAB52D80AF32C766644892E36D
                                                                                                                                                                                          SHA1:03CE96A3B3EBFC16C9ED192DD2127FB265A7ED49
                                                                                                                                                                                          SHA-256:54E5F126D4E7CC13555841A61FF66C0350621C089F475638A393930B3FB4918C
                                                                                                                                                                                          SHA-512:405A7F414FA0864111E5E9F06FCA675BF4EF11FE0F82F5438416273BEF820A030A50E4D43E4E522ED79C08C0C243E9DD3692971DC912C9ADFB1BEABEB935CDDC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Los_Angeles)]} {.. LoadTimeZoneFile America/Los_Angeles..}..set TZData(:US/Pacific) $TZData(:America/Los_Angeles)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):200
                                                                                                                                                                                          Entropy (8bit):4.977247045064076
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqx0ydJg4o3vXHAIg20ydJPyHRL/iP+yoQIAcGEydJgy:SlSWB9vsM3y7DvPHAIgp5N/i0Q90Dy
                                                                                                                                                                                          MD5:870946B6C9C7C48EDDFDC7FEA5A303F5
                                                                                                                                                                                          SHA1:F4E86423BD0EDFFD07B69B6D8834E28890A433BF
                                                                                                                                                                                          SHA-256:B14C515D5823E7F6E4C67892FA376D54DB748FAB139C4D40DB50F22D113BAE4F
                                                                                                                                                                                          SHA-512:36071FA97BD1052FB0425FDA7239F55728B3A6ACDF78A7A8F92D080DA25C0DF432F6C2B0CE9BD296B0C814451C5D7922E1318B004D9089E934B9C81B5E6077D6
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(America/Los_Angeles)]} {.. LoadTimeZoneFile America/Los_Angeles..}..set TZData(:US/Pacific-New) $TZData(:America/Los_Angeles)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):188
                                                                                                                                                                                          Entropy (8bit):4.838968615416201
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqTQGurKeTnXHAIgObTurKefVHRL/i6A5nUDHurKeTyn:SlSWB9vsM3yciemHAIgObiecN/idXevn
                                                                                                                                                                                          MD5:509CF35F5F7C9567FD19CC5C137DC070
                                                                                                                                                                                          SHA1:AA5F27D36BC617A6A4107E3CA0CB0C10A71A1D9E
                                                                                                                                                                                          SHA-256:E51FC51C65FFEAB514D7636271157EE8941BDACF602CBC380F5D60B5FA674E87
                                                                                                                                                                                          SHA-512:E23633A16F11015F3FE2F4E675B5A60B4FDC61F8CF152FDB9BA7ED4C213B8897117721A78C5470296DAFB0FD4F0DDC019DD0DB8C28C1F1B2BE0D3A289F53D5B3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Pacific/Pago_Pago)]} {.. LoadTimeZoneFile Pacific/Pago_Pago..}..set TZData(:US/Samoa) $TZData(:Pacific/Pago_Pago)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):153
                                                                                                                                                                                          Entropy (8bit):4.844017562912325
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqAxmS3vXHAIgELyHRL/iLB5h8RFB:SlSWB9vsM3yzTHAIgm6N/iLfh8RX
                                                                                                                                                                                          MD5:3402C8784654C24F7E956731866B833F
                                                                                                                                                                                          SHA1:C34F3CCA074A50E6564B8C78683C8763B37A3002
                                                                                                                                                                                          SHA-256:DEE28FF84E3FC495ED3547D5E5E9FAFDACC36A67329E747D434248ED45BF1755
                                                                                                                                                                                          SHA-512:FBA2840B0FA0F084EE9840BCF56E497F8A7ABF509FA10FA66FB26BA3D80079C4F9A363577A453CD68557080EAF9DD7F1F7B5AF957B64BDA2A897B1E08C85DD19
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/UTC)]} {.. LoadTimeZoneFile Etc/UTC..}..set TZData(:UTC) $TZData(:Etc/UTC)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):159
                                                                                                                                                                                          Entropy (8bit):4.879221007428352
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqAxmS3vXHAIgELyHRL/iL7DJMFfh8RFB:SlSWB9vsM3yzTHAIgm6N/iL7VMr8RX
                                                                                                                                                                                          MD5:5F24A249884C241D1E03D758C2641675
                                                                                                                                                                                          SHA1:63AAC15A68659006F8A14FEC3F2A66B55A8AC398
                                                                                                                                                                                          SHA-256:B7B0B82F471D64704E1D6F84646E6B7B2BD9CAB793FAD00F9C9B0595143C0AB7
                                                                                                                                                                                          SHA-512:A7AB5E26A2C23BA296942D7C524C6EE6708A9A38CDD88022EA92E2180BC3CCFE930758FC20A24A0D271AD70733EB924B0E530FBF83CC0FC49EAD411B28503CC0
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/UTC)]} {.. LoadTimeZoneFile Etc/UTC..}..set TZData(:Universal) $TZData(:Etc/UTC)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):172
                                                                                                                                                                                          Entropy (8bit):4.999171213761279
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqxVwTwWXHAIgoqzTbNOARL/gIuyQauTgvn:SlSWB9vsM3ymSHAIgoXAN/gXy5n
                                                                                                                                                                                          MD5:5444E85070CA2E7A52D38D6D53216B88
                                                                                                                                                                                          SHA1:0F9A4FB1156312EBD0B9C81DA2164E89D21878E1
                                                                                                                                                                                          SHA-256:F7DA75B585F45AB501B2889E272FF47B1C4A1D668E40AED7463EB0E8054028C2
                                                                                                                                                                                          SHA-512:BBC94F98C84641392D3A4B67C152E92EDB3011DA329319ADB2485DBEAFD44DED328D80FBCA89E58687E1F0EB6BED8580BBB0075CA42284B6206A8641D76F2DE5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Europe/Moscow)]} {.. LoadTimeZoneFile Europe/Moscow..}..set TZData(:W-SU) $TZData(:Europe/Moscow)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):6945
                                                                                                                                                                                          Entropy (8bit):3.7806395604065135
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:v6PgDGfXCiZoFtFPIaFF1w0urfva946ZGsE3f2Sf+aCNmSv+kznl4klEp8OT:rQbkIaFF1w0us4qE3+sSGjT
                                                                                                                                                                                          MD5:1EC38B05B53ECF2DD3A90164C4693934
                                                                                                                                                                                          SHA1:00900F0ADDB7526C63C67CA1662C038E95A79245
                                                                                                                                                                                          SHA-256:7E6E2369C19DD19A41BE27BB8AD8DF5BE8B0096ED045C8B2C2D2F0916D494079
                                                                                                                                                                                          SHA-512:47A8DAAB1B891FF09A94AF01B6673213392F70C6C1EE53D95A59D6E238FD06B0E80FA21C7279A9ADA891F5CA5B86E4D6B696EE8CFE14BFEF0ACCC9759AF1419A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit....set TZData(:WET) {.. {-9223372036854775808 0 0 WET}.. {228877200 3600 1 WEST}.. {243997200 0 0 WET}.. {260326800 3600 1 WEST}.. {276051600 0 0 WET}.. {291776400 3600 1 WEST}.. {307501200 0 0 WET}.. {323830800 3600 1 WEST}.. {338950800 0 0 WET}.. {354675600 3600 1 WEST}.. {370400400 0 0 WET}.. {386125200 3600 1 WEST}.. {401850000 0 0 WET}.. {417574800 3600 1 WEST}.. {433299600 0 0 WET}.. {449024400 3600 1 WEST}.. {465354000 0 0 WET}.. {481078800 3600 1 WEST}.. {496803600 0 0 WET}.. {512528400 3600 1 WEST}.. {528253200 0 0 WET}.. {543978000 3600 1 WEST}.. {559702800 0 0 WET}.. {575427600 3600 1 WEST}.. {591152400 0 0 WET}.. {606877200 3600 1 WEST}.. {622602000 0 0 WET}.. {638326800 3600 1 WEST}.. {654656400 0 0 WET}.. {670381200 3600 1 WEST}.. {686106000 0 0 WET}.. {701830800 3600 1 WEST}.. {717555600 0 0 WET}.. {733280400 3600 1 WEST}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):154
                                                                                                                                                                                          Entropy (8bit):4.8800842076244715
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:SlEVFRKvJT8QFtFb+MuUyqAxmS3vXHAIgELyHRL/taFBURFB:SlSWB9vsM3yzTHAIgm6N/YFaRX
                                                                                                                                                                                          MD5:DDB6F69CA4F0EF6A708481F53F95EAB9
                                                                                                                                                                                          SHA1:A63E900A9257E9D73B4BB4BACBA8133C3D1DC41B
                                                                                                                                                                                          SHA-256:A06E8CCCF97CC8FB545DFDB4C89B5E5C8EDF0360547BDC1823B4AC47B1556C31
                                                                                                                                                                                          SHA-512:C8EA1039BE001F5EF52662B28DBF46D02E4848F08F05923850DEA1994732037B4C8D6030B742D97FA4276AF5FEE3F17C47C7DDA4F44DD23244F9976A076D5CC4
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# created by tools/tclZIC.tcl - do not edit..if {![info exists TZData(Etc/UTC)]} {.. LoadTimeZoneFile Etc/UTC..}..set TZData(:Zulu) $TZData(:Etc/UTC)..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):5030
                                                                                                                                                                                          Entropy (8bit):4.838527643033185
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:HgTQWiZuhdFQJmuldFQofsGP3R1hF9Dl19arB0E9Dl1YoaEhHe2Gu/q1ZFyJRpqk:8iZUroxvR197ABr971h5GIqrmbqIc+b/
                                                                                                                                                                                          MD5:70450A0CF04EF273EFF2B070053FCFA6
                                                                                                                                                                                          SHA1:47974D6C0FC986EE1273C4E13DDB9E1288CEF0FF
                                                                                                                                                                                          SHA-256:678F891615E2209A8ECBA17857922A9723E78709ADB983032E89CA706000C44D
                                                                                                                                                                                          SHA-512:AFD3E47324D1497CC46AC6141191FCEB843977D0B0285C807FF8985DCC56FDE10977F57D503D986CD2C1EDC6C62F01E405A0EB483340B247B129FC8D6D9FE689
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# word.tcl --..#..# This file defines various procedures for computing word boundaries in..# strings. This file is primarily needed so Tk text and entry widgets behave..# properly for different platforms...#..# Copyright (c) 1996 Sun Microsystems, Inc...# Copyright (c) 1998 Scritpics Corporation...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES.....# The following variables are used to determine which characters are..# interpreted as white space.....if {$::tcl_platform(platform) eq "windows"} {.. # Windows style - any but a unicode space char.. if {![info exists ::tcl_wordchars]} {...set ::tcl_wordchars {\S}.. }.. if {![info exists ::tcl_nonwordchars]} {...set ::tcl_nonwordchars {\s}.. }..} else {.. # Motif style - any unicode word char (number, letter, or underscore).. if {![info exists ::tcl_wordchars]} {...set ::tcl_wordchars {\w}.. }.. if {![info exists ::tcl_nonwordchar
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1542552
                                                                                                                                                                                          Entropy (8bit):6.177696167346554
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24576:q1Bvnu8AyQD9FLi543GLUKuPO6EinYTVAiueFoC+vMvE58aVJkwd98ydeyRP/oAT:qIyQD9FU43GLUKuPO6EinYTVAFSvESaN
                                                                                                                                                                                          MD5:499FA3DEA045AF56EE5356C0CE7D6CE2
                                                                                                                                                                                          SHA1:0444B7D4ECD25491245824C17B84916EE5B39F74
                                                                                                                                                                                          SHA-256:20139F4C327711BAF18289584FA0C8112F7BB3BA55475BDED21F3D107672ED94
                                                                                                                                                                                          SHA-512:D776749EFFA241BA1415B28D2FCFF1D64ED903569A8C4E56DFDDD672A53B2F44119734B1959B72A9B3F4060BB2C67B7DEA959CC2D4A8E9F781F17009C6840FC1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A...f...f...f..W....f..W....f..W....f..W....f.......f......f....&..f.......f...f..Lg.....f......f...J..f......f..Rich.f..........PE..d......b.........." .........~......|...............................................q.....`.............................................L@...[..|........{... .......j.......`...A...-...............................-..8...............8............................text...X........................... ..`.rdata...l.......n..................@..@.data................j..............@....pdata....... ......................@..@.rsrc....{.......|..................@..@.reloc...A...`...B...(..............@..B........................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8806
                                                                                                                                                                                          Entropy (8bit):4.863085192885279
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:RpwYLapGk1BlM4UBIHpJFVUXUziMJ5Kxyk55qxUr7Vdk5vNR:RuYfvMdOXyj+01f
                                                                                                                                                                                          MD5:C5E9A2E32AE83A79DF422D1145B692DF
                                                                                                                                                                                          SHA1:08350F930FB97A95970122920C91FB9CED8329E9
                                                                                                                                                                                          SHA-256:8822365EE279BEBF7A36CFDEDBA1114762F894781F4635170CC5D85FF5B17923
                                                                                                                                                                                          SHA-512:71420E15A3D63329560074F6FFAD42CB464401284BC29D0DC8E34D83F8F77079F26BB4C5703E656A48E6931C3DBF6B873756FB212D0860483E0301B29EDE1212
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# bgerror.tcl --..#..#.Implementation of the bgerror procedure. It posts a dialog box with..#.the error message and gives the user a chance to see a more detailed..#.stack trace, and possible do something more interesting with that..#.trace (like save it to a log). This is adapted from work done by..#.Donal K. Fellows...#..# Copyright (c) 1998-2000 by Ajuba Solutions...# Copyright (c) 2007 by ActiveState Software Inc...# Copyright (c) 2007 Daniel A. Steffen <das@users.sourceforge.net>..# Copyright (c) 2009 Pat Thoyts <patthoyts@users.sourceforge.net>....namespace eval ::tk::dialog::error {.. namespace import -force ::tk::msgcat::*.. namespace export bgerror.. option add *ErrorDialog.function.text [mc "Save To Log"] \...widgetDefault.. option add *ErrorDialog.function.command [namespace code SaveToLog].. option add *ErrorDialog*Label.font TkCaptionFont widgetDefault.. if {[tk windowingsystem] eq "aqua"} {...option add *ErrorDialog*background systemAlertBackgroundActi
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):21612
                                                                                                                                                                                          Entropy (8bit):4.947590677310969
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:Tv7cBCAsj9oqlFFSsB3VfRt+lMpWaNwJgzCHarc6gAsj9oqlFFSsB3VlRtYlMpBz:TvweHBBTfIZxHBnZWqbJPBFIaVlCj26+
                                                                                                                                                                                          MD5:AEB53F7F1506CDFDFE557F54A76060CE
                                                                                                                                                                                          SHA1:EBB3666EE444B91A0D335DA19C8333F73B71933B
                                                                                                                                                                                          SHA-256:1F5DD8D81B26F16E772E92FD2A22ACCB785004D0ED3447E54F87005D9C6A07A5
                                                                                                                                                                                          SHA-512:ACDAD4DF988DF6B2290FC9622E8EACCC31787FECDC98DCCA38519CB762339D4D3FB344AE504B8C7918D6F414F4AD05D15E828DF7F7F68F363BEC54B11C9B7C43
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# button.tcl --..#..# This file defines the default bindings for Tk label, button,..# checkbutton, and radiobutton widgets and provides procedures..# that help in implementing those bindings...#..# Copyright (c) 1992-1994 The Regents of the University of California...# Copyright (c) 1994-1996 Sun Microsystems, Inc...# Copyright (c) 2002 ActiveState Corporation...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#-------------------------------------------------------------------------..# The code below creates the default class bindings for buttons...#-------------------------------------------------------------------------....if {[tk windowingsystem] eq "aqua"} {.... bind Radiobutton <Enter> {...tk::ButtonEnter %W.. }.. bind Radiobutton <1> {...tk::ButtonDown %W.. }.. bind Radiobutton <ButtonRelease-1> {...tk::ButtonUp %W.. }.. bind Checkbutton <Enter> {...tk::ButtonEnter %W
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:Nim source code, ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):9960
                                                                                                                                                                                          Entropy (8bit):4.802555950168837
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:HKOdkMpU9YUp8UIhMYYicln9Die0luVZat3pIp5Y3sF1P8Bg8p6trIOzvKsOiCLU:HyMm9J8wPx70luex4C8Fygq6tohef+0J
                                                                                                                                                                                          MD5:818E4F0112931F12B4FAC4CAD262814C
                                                                                                                                                                                          SHA1:AC7060DF952F9DB52C3687B8F5E6AA4ADF06992E
                                                                                                                                                                                          SHA-256:35B208E8570B0D1E0CA1C911D4FE02EE3B0CFE5667CF1BDEC006CF9D043122BA
                                                                                                                                                                                          SHA-512:0C535B6621BC83412B7A64CB6AC2BA526B8E49BB5F6BC5EBEDA41D223D68DEB031DB9C8A31F8671BC5F327D720942E7FDAE3328334B0B550AC991191F96909D6
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# choosedir.tcl --..#..#.Choose directory dialog implementation for Unix/Mac...#..# Copyright (c) 1998-2000 by Scriptics Corporation...# All rights reserved.....# Make sure the tk::dialog namespace, in which all dialogs should live, exists..namespace eval ::tk::dialog {}..namespace eval ::tk::dialog::file {}....# Make the chooseDir namespace inside the dialog namespace..namespace eval ::tk::dialog::file::chooseDir {.. namespace import -force ::tk::msgcat::*..}....# ::tk::dialog::file::chooseDir:: --..#..#.Implements the TK directory selection dialog...#..# Arguments:..#.args..Options parsed by the procedure...#..proc ::tk::dialog::file::chooseDir:: {args} {.. variable ::tk::Priv.. set dataName __tk_choosedir.. upvar ::tk::dialog::file::$dataName data.. Config $dataName $args.... if {$data(-parent) eq "."} {.. set w .$dataName.. } else {.. set w $data(-parent).$dataName.. }.... # (re)create the dialog box if necessary.. #.. if {![winfo exis
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):22112
                                                                                                                                                                                          Entropy (8bit):5.032169196169179
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:lJGidpe3JQDUd6hgp6EQstzQf+a9DPbJ43/H//cO802UeeVnZmM6BA0kyVJv9Qpu:Gep6JCwQDPbWPaRCzTdMAe
                                                                                                                                                                                          MD5:89C6CABEB68B1A5318D88DD8444C3DE3
                                                                                                                                                                                          SHA1:C19C58EEC7FB5105A609C0896EDCC336C00E7F9E
                                                                                                                                                                                          SHA-256:E7AA73828A731DCC9541308AA53FF3CF550A0952FD42C4D86D831F87FB47CDCF
                                                                                                                                                                                          SHA-512:A49A96A2BFC0D1A8E4003526E7836B9968DAF2B4DA727B23B7E180B5472DD187AB409D2FDF233F2557BD0DC2B4FE57AA2DD57BC2BDCE90DD2B603F4BB74CF22D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# clrpick.tcl --..#..#.Color selection dialog for platforms that do not support a..#.standard color selection dialog...#..# Copyright (c) 1996 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#..# ToDo:..#..#.(1): Find out how many free colors are left in the colormap and..#. don't allocate too many colors...#.(2): Implement HSV color selection...#....# Make sure namespaces exist..namespace eval ::tk {}..namespace eval ::tk::dialog {}..namespace eval ::tk::dialog::color {.. namespace import ::tk::msgcat::*..}....# ::tk::dialog::color:: --..#..#.Create a color dialog and let the user choose a color. This function..#.should not be called directly. It is called by the tk_chooseColor..#.function when a native color selector widget does not exist..#..proc ::tk::dialog::color:: {args} {.. variable ::tk::Priv.. set dataName __tk__color.. upvar ::tk::dialog::color::$da
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8690
                                                                                                                                                                                          Entropy (8bit):5.098389551322902
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:u4R7+/gFw/MEN55fO7eyjt4bjC+gR8e3vwLln/+LVtUw0tXK4jA:u4l+/gFeMI55Xyjt4bjC+gOe3Ih/+LV1
                                                                                                                                                                                          MD5:ABF277E4F62423F4345B6AD65640B8C2
                                                                                                                                                                                          SHA1:E66A4E37D51C7827C9ACA449A42E0966AACBC8C8
                                                                                                                                                                                          SHA-256:C7DA292CCF5F413E599C3491C331FFD58CF273F8477FACB097E6F36CF1F32A08
                                                                                                                                                                                          SHA-512:AA9F75D7C5C915B5FCD2F454856D080D186AB9BA149DC139FEAF7F4AC3DC51E6769E138E3B1BE45B3FEC3AE744189DE44DB2B748F0628FF13E4E733B9CD68BD5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# comdlg.tcl --..#..#.Some functions needed for the common dialog boxes. Probably need to go..#.in a different file...#..# Copyright (c) 1996 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# tclParseConfigSpec --..#..#.Parses a list of "-option value" pairs. If all options and..#.values are legal, the values are stored in..#.$data($option). Otherwise an error message is returned. When..#.an error happens, the data() array may have been partially..#.modified, but all the modified members of the data(0 array are..#.guaranteed to have valid values. This is different than..#.Tk_ConfigureWidget() which does not modify the value of a..#.widget record if any error occurs...#..# Arguments:..#..# w = widget record to modify. Must be the pathname of a widget...#..# specs = {..# {-commandlineswitch resourceName ResourceClass defaultValue verifier}..# {....}..# }..#..# flags
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):33942
                                                                                                                                                                                          Entropy (8bit):4.953820376776617
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:jMpwGUC0zCLemVueuR3fS8X4rqU9ykVBjG+FUHyOnmTTRV+po2mBh6S5mDjbHqzG:jMpdUFzCLpCrI3vVBhjnD2jVfV/
                                                                                                                                                                                          MD5:B927A17A86D5E43606C93CC6F90A5A4A
                                                                                                                                                                                          SHA1:03C1005EA8FABA9055591D095674D85F64E5C154
                                                                                                                                                                                          SHA-256:9D023DBF3B0FCD25E13502B34F8BE63F64DA592FA612EBD31C08AF4AC27338D6
                                                                                                                                                                                          SHA-512:B4443C72A28A172B0E113089085EC5D663A84384EB31B56BE23E507B285065E8D8EAB4A1306352A01843C13D1B5B15FF05D7956B89BCF693363D68C5B8B48864
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# console.tcl --..#..# This code constructs the console window for an application. It..# can be used by non-unix systems that do not have built-in support..# for shells...#..# Copyright (c) 1995-1997 Sun Microsystems, Inc...# Copyright (c) 1998-2000 Ajuba Solutions...# Copyright (c) 2007-2008 Daniel A. Steffen <das@users.sourceforge.net>..#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# TODO: history - remember partially written command....namespace eval ::tk::console {.. variable blinkTime 500 ; # msecs to blink braced range for.. variable blinkRange 1 ; # enable blinking of the entire braced range.. variable magicKeys 1 ; # enable brace matching and proc/var recognition.. variable maxLines 600 ; # maximum # of lines buffered in console.. variable showMatches 1 ; # show multiple expand matches.. variable useFontchooser [llength [info command ::tk::fontchooser]
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):5988
                                                                                                                                                                                          Entropy (8bit):4.829498876074983
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:qFR55woFFEciKwKClFEOTIhDHWyzaoj9zza7v0J7:qL55jiKwKCzTIhDbzaojhSG7
                                                                                                                                                                                          MD5:B2B3AA971D42FDBF92F13B45111EE1D3
                                                                                                                                                                                          SHA1:A74F2C2707463D6E209D0E0C96D75083AC6920A5
                                                                                                                                                                                          SHA-256:1C977052C1D8293CC5FE4198A538BECA9BC821AF85E76E4EEFBFB75B33CE8BED
                                                                                                                                                                                          SHA-512:146F658DA3E6E9176FA51C9836D7C1DCFC14E148A26B224155F6493C195A7FB20C2DC4EE21994E5A193B8DA8561C75374E830304F94F0C844E52AD829F6810D5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# dialog.tcl --..#..# This file defines the procedure tk_dialog, which creates a dialog..# box containing a bitmap, a message, and one or more buttons...#..# Copyright (c) 1992-1993 The Regents of the University of California...# Copyright (c) 1994-1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#..# ::tk_dialog:..#..# This procedure displays a dialog box, waits for a button in the dialog..# to be invoked, then returns the index of the selected button. If the..# dialog somehow gets destroyed, -1 is returned...#..# Arguments:..# w -..Window to use for dialog top-level...# title -.Title to display in dialog's decorative frame...# text -.Message to display in dialog...# bitmap -.Bitmap to display in dialog (empty string means none)...# default -.Index of button that is to display the default ring..#..(-1 means none)...# args -.One or more strings to display in buttons
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):18401
                                                                                                                                                                                          Entropy (8bit):4.982139840696722
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:mDfyRIlBk3yrt8qLjtpa+qh+rA4rsWRWrrMUtCPnkKYNlPp64ZnCD:mDfyRIlBk3yJ8mtpaplcp6o
                                                                                                                                                                                          MD5:F109865C52D1FD602E2D53E559E56C22
                                                                                                                                                                                          SHA1:5884A3BB701C27BA1BF35C6ADD7852E84D73D81F
                                                                                                                                                                                          SHA-256:AF1DE90270693273B52FC735DA6B5CD5CA794F5AFD4CF03FFD95147161098048
                                                                                                                                                                                          SHA-512:B2F92B0AC03351CDB785D3F7EF107B61252398540B5F05F0CC9802B4D28B882BA6795601A68E88D3ABC53F216B38F07FCC03660AB6404CF6685F6D80CC4357FC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# entry.tcl --..#..# This file defines the default bindings for Tk entry widgets and provides..# procedures that help in implementing those bindings...#..# Copyright (c) 1992-1994 The Regents of the University of California...# Copyright (c) 1994-1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#-------------------------------------------------------------------------..# Elements of tk::Priv that are used in this file:..#..# afterId -..If non-null, it means that auto-scanning is underway..#...and it gives the "after" id for the next auto-scan..#...command to be executed...# mouseMoved -..Non-zero means the mouse has moved a significant..#...amount since the button went down (so, for example,..#...start dragging out a selection)...# pressX -..X-coordinate at which the mouse button was pressed...# selectMode -..The style of selection currently underway:..#...char, word
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):5035
                                                                                                                                                                                          Entropy (8bit):4.819523401259934
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:J3MRZZ7HWb/6OgRKjtS6Mn9GRZZ7HWb2Y6aO6R5nh76SMoB2kd82KtTpsi2D0DSn:CRZdPul1RZdFaRf0XoB2gZKZpsi2pn
                                                                                                                                                                                          MD5:63B219BE9AFF1DE7DE2BAF0E941CAE38
                                                                                                                                                                                          SHA1:A2FEBB31380E12FF01E6F641FE8B4F815941462F
                                                                                                                                                                                          SHA-256:8872F236D7E824AEC0ACD4BACC00FDD7EC9BC5534814ECF2160610C10647B7C5
                                                                                                                                                                                          SHA-512:057700F8FDE4B7C3D7AB7CEFD6C531060BF2B1B3B727CAD6A37ECD42EBC557765D94B83ADD438BD5AFA1F6F919D80AE755A8D98918981167B871F31AD42FDF5E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# focus.tcl --..#..# This file defines several procedures for managing the input..# focus...#..# Copyright (c) 1994-1995 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# ::tk_focusNext --..# This procedure returns the name of the next window after "w" in..# "focus order" (the window that should receive the focus next if..# Tab is typed in w). "Next" is defined by a pre-order search..# of a top-level and its non-top-level descendants, with the stacking..# order determining the order of siblings. The "-takefocus" options..# on windows determine whether or not they should be skipped...#..# Arguments:..# w -..Name of a window.....proc ::tk_focusNext w {.. set cur $w.. while {1} {.....# Descend to just before the first child of the current widget......set parent $cur...set children [winfo children $cur]...set i -1.....# Look for the next sibling that isn't a top-leve
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):16467
                                                                                                                                                                                          Entropy (8bit):4.795270290870865
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:aUcEQ2Mq56jP/oVR6EcW0i9cWHKVo8q5F2Zsb9M:aUcEQ2Mq56jP/oVR6Ec5i9hKSxFC
                                                                                                                                                                                          MD5:A11F7D5F858E28D67F5391454401CAE8
                                                                                                                                                                                          SHA1:8ACAE04BE25249A3B7524B2C4AC03BF9FCF081D7
                                                                                                                                                                                          SHA-256:48C6D9EABB028A57291C009E1B02756D1EA6A18F9ACA7066C59BC3C5D881D3A6
                                                                                                                                                                                          SHA-512:E8D9B11208642C62166C62AF605341EC7BEEF4E178DD3FCC9E72E4436BE1F4E5D1952B78C5FA206D85D61693922FE26ACAF9267725387F2A7A56EE2D95A6D69A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# fontchooser.tcl -..#..#.A themeable Tk font selection dialog. See TIP #324...#..# Copyright (C) 2008 Keith Vetter..# Copyright (C) 2008 Pat Thoyts <patthoyts@users.sourceforge.net>..#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES.....namespace eval ::tk::fontchooser {.. variable S.... set S(W) .__tk__fontchooser.. set S(fonts) [lsort -dictionary [font families]].. set S(styles) [list \...[::msgcat::mc "Regular"] \...[::msgcat::mc "Italic"] \...[::msgcat::mc "Bold"] \...[::msgcat::mc "Bold Italic"] \.. ].... set S(sizes) {8 9 10 11 12 14 16 18 20 22 24 26 28 36 48 72}.. set S(strike) 0.. set S(under) 0.. set S(first) 1.. set S(sampletext) [::msgcat::mc "AaBbYyZz01"].. set S(-parent) ... set S(-title) [::msgcat::mc "Font"].. set S(-command) "".. set S(-font) TkDefaultFont..}....proc ::tk::fontchooser::Setup {} {.. variable S.... # Canonical versions of f
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:Tcl script, ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):17421
                                                                                                                                                                                          Entropy (8bit):4.954921304048498
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:FNP8nO9Wo8k5NfQH8EsOy8WMVbcfNCvJshPOw7jW:FNf8uNfQH89Z8WMVY15DW
                                                                                                                                                                                          MD5:4FDE770E3DFF8B95295FB887F510534B
                                                                                                                                                                                          SHA1:5356BA885D61910A34756188D676FACD0353ED8A
                                                                                                                                                                                          SHA-256:C8B4B2130C6AD658331C59F41D8BDBAB44E0011781214A0B0BE78C4920536B2E
                                                                                                                                                                                          SHA-512:30BF50137F18643FC3622EAA195EC7E0F21B77980C16DB54CCA1B7AEFA17CA4CE8E6F82D6C8F4A0DFB6DD78D4F115D3A5D8DA7573A928AF9C1A92727BD4F0691
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# iconlist.tcl..#..#.Implements the icon-list megawidget used in the "Tk" standard file..#.selection dialog boxes...#..# Copyright (c) 1994-1998 Sun Microsystems, Inc...# Copyright (c) 2009 Donal K. Fellows..#..# See the file "license.terms" for information on usage and redistribution of..# this file, and for a DISCLAIMER OF ALL WARRANTIES...#..# API Summary:..#.tk::IconList <path> ?<option> <value>? .....#.<path> add <imageName> <itemList>..#.<path> cget <option>..#.<path> configure ?<option>? ?<value>? .....#.<path> deleteall..#.<path> destroy..#.<path> get <itemIndex>..#.<path> index <index>..#.<path> invoke..#.<path> see <index>..#.<path> selection anchor ?<int>?..#.<path> selection clear <first> ?<last>?..#.<path> selection get..#.<path> selection includes <item>..#.<path> selection set <first> ?<last>?.....package require Tk....::tk::Megawidget create ::tk::IconList ::tk::FocusableWidget {.. variable w canvas sbar accel accelCB fill font index \...itemList itemsPerColumn list
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):11037
                                                                                                                                                                                          Entropy (8bit):6.048349526382653
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:0nEPytJLl1S47T3YqN5/vkJpnhXqBB4aw2rqZiygTtYTpOq/pc75Mk:xqLz7F5KTqBBLuZ1gTSsqhk
                                                                                                                                                                                          MD5:995A0A8F7D0861C268AEAD5FC95A42EA
                                                                                                                                                                                          SHA1:21E121CF85E1C4984454237A646E58EC3C725A72
                                                                                                                                                                                          SHA-256:1264940E62B9A37967925418E9D0DC0BEFD369E8C181B9BAB3D1607E3CC14B85
                                                                                                                                                                                          SHA-512:DB7F5E0BC7D5C5F750E396E645F50A3E0CDE61C9E687ADD0A40D0C1AA304DDFBCEEB9F33AD201560C6E2B051F2EDED07B41C43D00F14EE435CDEEE73B56B93C7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# icons.tcl --..#..#.A set of stock icons for use in Tk dialogs. The icons used here..#.were provided by the Tango Desktop project which provides a..#.unified set of high quality icons licensed under the..#.Creative Commons Attribution Share-Alike license..#.(https://creativecommons.org/licenses/by-sa/3.0/)..#..#.See http://tango.freedesktop.org/Tango_Desktop_Project..#..# Copyright (c) 2009 Pat Thoyts <patthoyts@users.sourceforge.net>....namespace eval ::tk::icons {}....image create photo ::tk::icons::warning -data {.. iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAABHNCSVQICAgIfAhkiAAABSZJREFU.. WIXll1toVEcYgL+Zc87u2Yu7MYmrWRuTJuvdiMuqiJd4yYKXgMQKVkSjFR80kFIVJfWCWlvpg4h9.. 8sXGWGof8iKNICYSo6JgkCBEJRG8ImYThNrNxmaTeM7pQ5IlJkabi0/9YZhhZv7///4z/8zPgf+7.. KCNRLgdlJijXwRyuDTlcxV9hbzv8nQmxMjg+XDtiOEplkG9PSfkztGmTgmFQd+FCVzwa3fYN/PHZ.. AcpBaReicW5xcbb64IEQqko8Lc26d/58cxS+/BY6hmJvyEfQBoUpwWCmW1FErKaGWHU13uRk4QkE.. UtxQNFR7QwIoB4eiKD9PWbVKbb10CZmaCqmpxCormRYO26QQx85B0mcD+AeK0
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):329
                                                                                                                                                                                          Entropy (8bit):4.3973643486226655
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:nVxpJFBmHdeA1xNZgk0dIf3Ju4dFi6/XWrWhr3W7FxmVFraazmVAJFKyVQR7icr8:nj5Bqf1fZgp6A4FDG6dm7FUGAJVVMRmn
                                                                                                                                                                                          MD5:921245A21F7E783997DC7B859AF1B65B
                                                                                                                                                                                          SHA1:2EFE3C8F70CF18621006890BF21CC097770D140D
                                                                                                                                                                                          SHA-256:C6DB098EBD8A622164D37D4AB0A8C205DB1A83AC3065D5CDE3CB5FB61925D283
                                                                                                                                                                                          SHA-512:CAD823FF3D13A64C00825961E75B5133690556FB1F622834F8B1DF316A9E75BABB63B9F5148DAE7B1391123B4C8D55B4B8B2EB6F8E6E1DA9DE02A5BD7AC0FD6F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:README - images directory....This directory includes images for the Tcl Logo and the Tcl Powered..Logo. Please feel free to use the Tcl Powered Logo on any of your..products that employ the use of Tcl or Tk. The Tcl logo may also be..used to promote Tcl in your product documentation, web site or other..places you so desire...
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PostScript document text conforming DSC level 3.0, type EPS
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):34991
                                                                                                                                                                                          Entropy (8bit):5.248845410801251
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:0YrY6a0v4uIqYMEKjodQKOfRXMLcSqDGpfTKFVm3AsanMEDzzBHWzaw7XUbTJjoB:0YrY6aeIqYMEKjouzfRXMLcSqDGpfTKo
                                                                                                                                                                                          MD5:23C4EDED40DEC065F99E6653AEE1BB31
                                                                                                                                                                                          SHA1:3175E261BE198731DEDB07264CCB84C8DEDF7967
                                                                                                                                                                                          SHA-256:76207D8DFDE189A29DC0E76ADB7EAAA606B96BC6C1C831F34D1C85B1C5B51DD3
                                                                                                                                                                                          SHA-512:BA139A64BE72BB681040924C4294E2726BA5AB243E805E60A854D2D23E154705E2431D1AB2DE732BFA393747FD30D8A5C913895CBE1463DBF50CC23CAE5B0454
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:%!PS-Adobe-3.0 EPSF-3.0..%%Creator: Adobe Illustrator(TM) 5.5..%%For: (Bud Northern) (Mark Anderson Design)..%%Title: (TCL/TK LOGO.ILLUS)..%%CreationDate: (8/1/96) (4:58 PM)..%%BoundingBox: 251 331 371 512..%%HiResBoundingBox: 251.3386 331.5616 370.5213 511.775..%%DocumentProcessColors: Cyan Magenta Yellow..%%DocumentSuppliedResources: procset Adobe_level2_AI5 1.0 0..%%+ procset Adobe_IllustratorA_AI5 1.0 0..%AI5_FileFormat 1.2..%AI3_ColorUsage: Color..%%DocumentCustomColors: (TCL RED)..%%CMYKCustomColor: 0 0.45 1 0 (Orange)..%%+ 0 0.25 1 0 (Orange Yellow)..%%+ 0 0.79 0.91 0 (TCL RED)..%AI3_TemplateBox: 306 396 306 396..%AI3_TileBox: 12 12 600 780..%AI3_DocumentPreview: Macintosh_ColorPic..%AI5_ArtSize: 612 792..%AI5_RulerUnits: 0..%AI5_ArtFlags: 1 0 0 1 0 0 1 1 0..%AI5_TargetResolution: 800..%AI5_NumLayers: 1..%AI5_OpenToView: 90 576 2 938 673 18 1 1 2 40..%AI5_OpenViewLayers: 7..%%EndComments..%%BeginProlog..%%BeginResource: procset Adobe_level2_AI5 1.0 0..%%Title: (Adobe Illustrator
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:GIF image data, version 89a, 68 x 100
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2341
                                                                                                                                                                                          Entropy (8bit):6.9734417899888665
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:qF/mIXn3l7+ejbL/4nZEsKPKer1OPQqVRqJbPpRRKOv/UVO47f:81nHL4T0KorxvRKkc847f
                                                                                                                                                                                          MD5:FF04B357B7AB0A8B573C10C6DA945D6A
                                                                                                                                                                                          SHA1:BCB73D8AF2628463A1B955581999C77F09F805B8
                                                                                                                                                                                          SHA-256:72F6B34D3C8F424FF0A290A793FCFBF34FD5630A916CD02E0A5DDA0144B5957F
                                                                                                                                                                                          SHA-512:10DFE631C5FC24CF239D817EEFA14329946E26ED6BCFC1B517E2F9AF81807977428BA2539AAA653A89A372257D494E8136FD6ABBC4F727E6B199400DE05ACCD5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:GIF89aD.d...............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3..............f..3.............f..3..........f.3...f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3.............f..3............f..3.............f..3....f..f.f..ff.f3.f..3..3.3..3f.33.3...........f..3...f..f..f..f.ff.3f..f..f..f.f.ff.3f..f..f..f..f.ff.3f..ff.ff.ff.fffff3ff.f3.f3.f3.f3ff33f3.f..f..f..f.ff.3f..3..3..3..3.f3.33..3..3..3.3.f3.33..3..3..3..3.f3.33..3f.3f.3f.3ff3f33f.33.33.33.33f33333.3..3..3..3.f3.33.............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3...............w..U..D..".....................w..U..D..".....................w..U..D..".................wwwUUUDDD"""......,....D.d........H......*\...z..Ht@Q...92.p...z.$.@@.E..u.Y.2..0c..q.cB.,[..... ..1..qbM.2~*].....s...S.@.L.j..#..\......h..........].D(..m......@.Z....oO...3=.c...G".(..pL...q]..%....[...#...+...X.h....^.....
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:GIF image data, version 89a, 43 x 64
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1670
                                                                                                                                                                                          Entropy (8bit):6.326462043862671
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:PF/mIXn3l7+ejbL/4xsgq4sNC6JYp6s/pmp76F:/1nHL404raM/op2
                                                                                                                                                                                          MD5:B226CC3DA70AAB2EBB8DFFD0C953933D
                                                                                                                                                                                          SHA1:EA52219A37A140FD98AEA66EA54685DD8158D9B1
                                                                                                                                                                                          SHA-256:138C240382304F350383B02ED56C69103A9431C0544EB1EC5DCD7DEC7A555DD9
                                                                                                                                                                                          SHA-512:3D043F41B887D54CCADBF9E40E48D7FFF99B02B6FAF6B1DD0C6C6FEF0F8A17630252D371DE3C60D3EFBA80A974A0670AF3747E634C59BDFBC78544D878D498D4
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:GIF89a+.@...............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3..............f..3.............f..3..........f.3...f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3.............f..3............f..3.............f..3....f..f.f..ff.f3.f..3..3.3..3f.33.3...........f..3...f..f..f..f.ff.3f..f..f..f.f.ff.3f..f..f..f..f.ff.3f..ff.ff.ff.fffff3ff.f3.f3.f3.f3ff33f3.f..f..f..f.ff.3f..3..3..3..3.f3.33..3..3..3.3.f3.33..3..3..3..3.f3.33..3f.3f.3f.3ff3f33f.33.33.33.33f33333.3..3..3..3.f3.33.............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3...............w..U..D..".....................w..U..D..".....................w..U..D..".................wwwUUUDDD"""......,....+.@........H. .z..(tp......@...92....#. A.......C.\.%...)Z..1a.8s..W/..@....3..C...y$.GW.....5.FU..j..;.F(Pc+W.-..X.D-[.*g....F..`.:mkT...Lw...A/.....u.7p..a..9P.....q2..Xg..G....3}AKv.\.d..yL.>..1.#
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:GIF image data, version 89a, 354 x 520
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):11000
                                                                                                                                                                                          Entropy (8bit):7.88559092427108
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:d+nY6zludc/We/yXy9JHBUoIMSapQdrGlapzmyNMK1vbXkgMmgFW/KxIq3NhZe:YnY6p4c/OCHyowaGUaCcMK1vbXNwFW/l
                                                                                                                                                                                          MD5:45D9B00C4CF82CC53723B00D876B5E7E
                                                                                                                                                                                          SHA1:DDD10E798AF209EFCE022E97448E5EE11CEB5621
                                                                                                                                                                                          SHA-256:0F404764D07A6AE2EF9E1E0E8EAAC278B7D488D61CF1C084146F2F33B485F2ED
                                                                                                                                                                                          SHA-512:6E89DACF2077E1307DA05C16EF8FDE26E92566086346085BE10A7FD88658B9CDC87A3EC4D17504AF57D5967861B1652FA476B2DDD4D9C6BCFED9C60BB2B03B6F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:GIF89ab.................f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3..............f..3.............f..3..........f.3...f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3.............f..3............f..3.............f..3....f..f.f..ff.f3.f..3..3.3..3f.33.3...........f..3...f..f..f..f.ff.3f..f..f..f.f.ff.3f..f..f..f..f.ff.3f..ff.ff.ff.fffff3ff.f3.f3.f3.f3ff33f3.f..f..f..f.ff.3f..3..3..3..3.f3.33..3..3..3.3.f3.33..3..3..3..3.f3.33..3f.3f.3f.3ff3f33f.33.33.33.33f33333.3..3..3..3.f3.33.............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3...............w..U..D..".....................w..U..D..".....................w..U..D..".................wwwUUUDDD"""......,....b..........H......*\....#J.H....3j.... '.;p....(.8X..^.0c.I...z8O.\.....:....$..Fu<8`...P.>%I.gO.C.h-..+.`....@..h....dJ.?...K...H.,U.._.#...g..[.*^.x.....J.L.!.'........=+eZ..i..ynF.8...].y|..m.
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:GIF image data, version 87a, 120 x 181
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):3889
                                                                                                                                                                                          Entropy (8bit):7.425138719078912
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:9qqbIh+cE4C8ric/jxK5mxsFBu3/0GIJ6Qap1Y5uMiR8pw5rB/SgijDb+TOh:hy+mnZ7xK5IsTwDQmkdiiG5rB/BE+6h
                                                                                                                                                                                          MD5:BD12B645A9B0036A9C24298CD7A81E5A
                                                                                                                                                                                          SHA1:13488E4F28676F1E0CE383F80D13510F07198B99
                                                                                                                                                                                          SHA-256:4D0BD3228AB4CC3E5159F4337BE969EC7B7334E265C99B7633E3DAF3C3FCFB62
                                                                                                                                                                                          SHA-512:F62C996857CA6AD28C9C938E0F12106E0DF5A20D1B4B0B0D17F6294A112359BA82268961F2A054BD040B5FE4057F712206D02F2E668675BBCF6DA59A4DA0A1BB
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:GIF87ax............................................................................z.....{..o.....m..b...`{.X....vy...hk.Um.N...I`.D..Z^.LP.?R.;!....?C.5C.3#.l..,6.*&.15...`..#(.If.y.....l...._..#/...Hm.>_.y..4R.k..#6..._......w..*K.^.."<.....G{.w..3_."C.Q..F....v..!K...v.2m.)_.[..!R.u.1t.g..)f. X.O..E..1z.g. _.Z..D..:..0..Z.. f.D..0..'z..m.N..C../.z.svC.q/.m.ze7.\..P..I..1%.,...............................................................................................................................................................................................................................................................................................................................................................................................,....x..........H.......D..!...7.PAQ...._l8.... C.<.a...*.x....0q.. ..M.%.<.HBe.@.....Q..7..XC..P..<z3..X...P.jA.%'@.J.lV.......R.,..+....t....7h.....(..a...+^.'..7..L.....V...s..$....a.....8`.9..}K......
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PostScript document text conforming DSC level 3.0, type EPS
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):29706
                                                                                                                                                                                          Entropy (8bit):5.33387357427899
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:0warY6a0v4uIqYMEKjodQKOfRtMLcSqDGpf88KFVmlhEtOI/eE7U0a1:03rY6aeIqYMEKjouzfRtMLcSqDGpfbKc
                                                                                                                                                                                          MD5:4AE11820D4D592D02CDE458E6F8CE518
                                                                                                                                                                                          SHA1:A2E8D3D6191B336D43E48A65C3AE6485B07D93C6
                                                                                                                                                                                          SHA-256:87FD9E46DBB5F2BF1529AFB411182C9FB9C58E23D830C66A233AF0C256BB8EFF
                                                                                                                                                                                          SHA-512:E0AD4ED570D414BF00931B0F5BBB61FEF981ABDB22ECC42F8E9841905D38874CDFE38F22EDB17ACD0F7539B2932F9C4A865FA73A49BB1458CE05EE10A78BE357
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:%!PS-Adobe-3.0 EPSF-3.0..%%Creator: Adobe Illustrator(TM) 5.5..%%For: (Bud Northern) (Mark Anderson Design)..%%Title: (TCL PWRD LOGO.ILLUS)..%%CreationDate: (8/1/96) (4:59 PM)..%%BoundingBox: 242 302 377 513..%%HiResBoundingBox: 242.0523 302.5199 376.3322 512.5323..%%DocumentProcessColors: Cyan Magenta Yellow..%%DocumentSuppliedResources: procset Adobe_level2_AI5 1.0 0..%%+ procset Adobe_IllustratorA_AI5 1.0 0..%AI5_FileFormat 1.2..%AI3_ColorUsage: Color..%%CMYKCustomColor: 0 0.45 1 0 (Orange)..%%+ 0 0.25 1 0 (Orange Yellow)..%%+ 0 0.79 0.91 0 (PANTONE Warm Red CV)..%%+ 0 0.79 0.91 0 (TCL RED)..%AI3_TemplateBox: 306 396 306 396..%AI3_TileBox: 12 12 600 780..%AI3_DocumentPreview: Macintosh_ColorPic..%AI5_ArtSize: 612 792..%AI5_RulerUnits: 0..%AI5_ArtFlags: 1 0 0 1 0 0 1 1 0..%AI5_TargetResolution: 800..%AI5_NumLayers: 1..%AI5_OpenToView: 102 564 2 938 673 18 1 1 2 40..%AI5_OpenViewLayers: 7..%%EndComments..%%BeginProlog..%%BeginResource: procset Adobe_level2_AI5 1.0 0..%%Title: (Adobe I
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:GIF image data, version 89a, 64 x 100
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1615
                                                                                                                                                                                          Entropy (8bit):7.461273815456419
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:aE45BzojC3r1WAQ+HT2gAdKhPFZ/ObchgB8:V5Gb1WN+yfcObmgW
                                                                                                                                                                                          MD5:DBFAE61191B9FADD4041F4637963D84F
                                                                                                                                                                                          SHA1:BD971E71AE805C2C2E51DD544D006E92363B6C0C
                                                                                                                                                                                          SHA-256:BCC0E6458249433E8CBA6C58122B7C0EFA9557CBC8FB5F9392EED5D2579FC70B
                                                                                                                                                                                          SHA-512:ACEAD81CC1102284ED7D9187398304F21B8287019EB98B0C4EC7398DD8B5BA8E7D19CAA891AA9E7C22017B73D734110096C8A7B41A070191223B5543C39E87AF
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:GIF89a@.d.............................f.................f...ff.f3.f..33.3.........f..ff.f3.33.3.f..f..ff.ff.ffff3ff333f.3f.33.33f.3...................................................................!.. -dl-.!.......,....@.d....@.pH,..E.... ..(...H$..v..j....K....q..5L......^).3.Y7..r..u.v|g..om...\iHl..p...`G..\~....fn[q...P.g.Z.l....y...\.l......f.Z.g...%%....e...e...)....O.f..e. ....O..qf..%..(.H.u..]..&....#4.......@.).....u!.M..2. ..PJ..#..T..a.....P.Gi... <Hb....x..z.3.X.O..f.........].Bt..lB.Q.r...9pP....&...L. ..,`[.....E6.Q.....?.#L......|g........N....[.._........."4......b....G6.........m.zI].....I.@.......I.9...glew...2.B..c>./..2....x.....<...{...7;.....y.I.....4G.Qj0..7..%.W.V...?!..[...X..=..k.h..[Q<.....0.B....(P.x.,.......8O*Z.8P!.$....u.c..Ea!..eC....CB.. .H..E..#..C..E...z..&.Nu........c.0..#.T.M.U........l.p @..s.|..pf!..&.......8.#.8.....*..J>. .t..h6(........#..0.A...*!..)...x..u.Z....*%..H.....*.......`......|.....1.......&.....T*...f.l...
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:GIF image data, version 89a, 97 x 150
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2489
                                                                                                                                                                                          Entropy (8bit):7.708754027741608
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:/Ev7JJ+3uvz/Hwbcp7igaIwjBui7qFxIIOdJXcI+Ks:M9oWz/7pZAV7qPIImJXtXs
                                                                                                                                                                                          MD5:711F4E22670FC5798E4F84250C0D0EAA
                                                                                                                                                                                          SHA1:1A1582650E218B0BE6FFDEFFD64D27F4B9A9870F
                                                                                                                                                                                          SHA-256:5FC25C30AEE76477F1C4E922931CC806823DF059525583FF5705705D9E913C1C
                                                                                                                                                                                          SHA-512:220C36010208A87D0F674DA06D6F5B4D6101D196544ABCB4EE32378C46C781589DB1CE7C7DFE6471A8D8E388EE6A279DB237B18AF1EB9130FF9D0222578F1589
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:GIF89aa...............................f.................f...ff.f3.f..33.3............f..ff.f3.33.3.f..ff.ff.ffff3ff333f.3f.33.33f.3...................................................................!.. -dl-.!.......,....a......@.pH,...r.l:..TB.T..V..z..H.j..h...&.......t"....F...d..gN~Y...g....}..r....g.....o...g.......Y.w..W......N....Z....W....f...tL.~.f....New............W.M.r.........O.q........W-./i.*...`..z..F9.../9..-.......$6..G..S...........zB.,nw.64...e4.......HOt......f.....)..OX..C.eU.(.Qh.....T..<Q.Y.P.L.YxT....2........ji..3.^)zz..O.a..6 ...TZ........^...7.....>|P.....w$...k.ZF.\R.u....F.]Z.--(v+)[Y....=.!.W..+.]..]._.....&..../Ap...j...!..b.:...{.^.=.`...U.....@Hf..\?.(..Lq@.........0..L...a...&.!.....]#..]G \..q...A.H.X[...(.W......,...1a..B...W(.t.8.AdG.)..(P=...Uu.u..A.KM\...'r.R./.W..d2a.0..G...?...B......#H........1Q.0...R....%+...0.I..{.<......QV.tz'.yn.E.p..0i.I.g......L....%....K...A.l.ph.Q.1e...Z....g..2e...smU&d;.J..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:GIF image data, version 89a, 113 x 175
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2981
                                                                                                                                                                                          Entropy (8bit):7.758793907956808
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:AmEwM8ioQoHJQBTThKVI7G78NLL120GFBBFXJRxlu+BmO/5lNqm7Eq:B57QoHJQt4II8BZ+jxluZO/5lNqm7Eq
                                                                                                                                                                                          MD5:DA5FB10F4215E9A1F4B162257972F9F3
                                                                                                                                                                                          SHA1:8DB7FB453B79B8F2B4E67AC30A4BA5B5BDDEBD3B
                                                                                                                                                                                          SHA-256:62866E95501C436B329A15432355743C6EFD64A37CFB65BCECE465AB63ECF240
                                                                                                                                                                                          SHA-512:990CF306F04A536E4F92257A07DA2D120877C00573BD0F7B17466D74E797D827F6C127E2BEAADB734A529254595918C3A5F54FDBD859BC325A162C8CD8F6F5BE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:GIF89aq...............................f.................f...ff.f3.f..33.3............f..ff.f3.3f.33.3.f..ff.ff.ffff3ff333f.3f.33.33f.3................................................................!.. -dl-.!.......,....q......@.pH,...r.l:....A}H...v..R......D.VF..,%M....^.....fyzU.P..f...i.....t..Uqe..N..Z..i......~....g......u.....g......\...h.....P...h.....Q..g....Z..h......]......\...M...[..s...c2.+R.$. ......#.....)v..4....MO.b.....9......[.M.........h'..<-..=.....HQD....D?.~......W7. ..V.W0..l....*0p}..KP?c.\@KW.S(..M..B.....-q...S2...*.,..P.{....F..._MAn ....i.Y3............zh.y.j@...a876...ui.i..;K.........p...`.,}w....tv.m...Y..........;.;.e).e&.......-.NC.*4..(........*..F........[,w....f......E....h..a3.T.^.........)...C.N8.h\T...+&.z....g]H..B..#.t6..Z.....j.-..N......TI....A........M?..Q&V'...Mb.f.x...h.$r.U .9..Ci. ].4.Zb..@...X....%..<..b)V!........Y)x......T.....h.p.d..h..(........]@.**J.M.U.Jf...Y.:....F..g:..d..6q.-..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:GIF image data, version 89a, 130 x 200
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):3491
                                                                                                                                                                                          Entropy (8bit):7.790611381196208
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:ROGuxkQ9mcV7RXcECEtqCa+6GK8WseNXhewFIp9ZmL4u:ROGwpVOEbqCrWsUhtIk4u
                                                                                                                                                                                          MD5:A5E4284D75C457F7A33587E7CE0D1D99
                                                                                                                                                                                          SHA1:FA98A0FD8910DF2EFB14EDAEC038B4E391FEAB3C
                                                                                                                                                                                          SHA-256:BAD9116386343F4A4C394BDB87146E49F674F687D52BB847BD9E8198FDA382CC
                                                                                                                                                                                          SHA-512:4448664925D1C1D9269567905D044BBA48163745646344E08203FCEF5BA1524BA7E03A8903A53DAF7D73FE0D9D820CC9063D4DA2AA1E08EFBF58524B1D69D359
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:GIF89a................................f.................f...ff.f3.f..33.3............f..ff.3f.33.3.f..ff.ff.ffff3ff333f.3f.33.33f.3...................................................................!.. -dl-.!.......,...........@.pH,...r.l:..T..F$XIe..V$.x..V.Z.z..F.pxd~..........{....o....l..{.b...hi[}P.k...y.....y.f.._R.\...............m.....y.....x......^.Q...j.....\S.....^.......l......]...[.......).....{....7...`..<...`..">..i.?/..@............>..Z.z@....0B..r...j.V.I.@..;%R...*...J.p.A.t.*..$A*...>`.....@g5BP.A..p.x.............q..8...... ...(.Q..#..@...F..YSK..M..#o.....D.m..-.....k}...BT..V......'.....`.d..~;..9+..6...<b.eZ..y^0]0..I...=.6.....}.0<.Z...M...Y1*35.e.....b...U0F~.-.HT......l2.s.q`-....y...e....dPZ....~.zT.M.... "r.E/k. ...*..Lj@'........Pcd&.(..mxF_w.."K..x!..--Y`..A.....Be.jH.A..\..j.....du#.....]^...>......].i.FMO..].9n1",Y...F...EW.9.....0TY.T...Cv!i`%...Hz@.]..U.!Y...#Dv&pi.z(.mn.A....@Q.0.%...&.4.v.cw(.`cd'|..M9..."...,*.......
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:GIF image data, version 89a, 48 x 75
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1171
                                                                                                                                                                                          Entropy (8bit):7.289201491091023
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:DOfHIzP8hqiF+oyPOmp3XHhPBlMVvG0ffWLpfc:DGoPM+o0OmZXHhOv5WRc
                                                                                                                                                                                          MD5:7013CFC23ED23BFF3BDA4952266FA7F4
                                                                                                                                                                                          SHA1:E5B1DED49095332236439538ECD9DD0B1FD4934B
                                                                                                                                                                                          SHA-256:462A8FF8FD051A8100E8C6C086F497E4056ACE5B20B44791F4AAB964B010A448
                                                                                                                                                                                          SHA-512:A887A5EC33B82E4DE412564E86632D9A984E8498F02D8FE081CC4AC091A68DF6CC1A82F4BF99906CFB6EA9D0EF47ADAC2D1B0778DCB997FB24E62FC7A6D77D41
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:GIF89a0.K.............................f.................f...ff.f3.f..33.3.........f..ff.f3.3f.33.3.f..ff.ff.f3ff333f.3f.33.33f.3......................................................................!.. -dl-.!.......,....0.K....@.pH,...GD.<:..%SR.Z......<.V.$l.....z......:.. .|v[D..f...z.W.G.Vr...NgsU.yl..qU..`.......`fe`.......Fg....(.&...g.Y.. .."..q.V.$.'.Ez.W....y...Y.U...(#Xrf.........Xux.U..........(U.4...X....G.B..t..1S...R..Y. ...l ..".>.h......,%K....A.....<s....#..8.iK.....a.y$h..DQh.PE)....6.....MyL.qzF..... ."..Y0..a......2..*t..Ma..b...M..R.....\..st..=....Q......,>s`....Qt.,..B.R.....!.$..%.....(...s...B.T...`,".h(. D....8..dC..\Q.p.......x.#A.....:..du..(D.XV......7....S.#n8a....2`...f.:G,...==(......`!..$...t....b..../N|...f..J.x... P&.|.d._!N...].1w.3D.0!....@o&H...N.B.J....pz8..w.i....=r.............@5.-!.......H."..[.j.AB<..p....h...V.D..6.h...ab1F.g...I !.V~.H..V.........:.G..|c...,.....TD5..c[.W.....LC.....FJ..71[..lH.M.....8.:$......
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:GIF image data, version 89a, 100 x 100
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):5473
                                                                                                                                                                                          Entropy (8bit):7.754239979431754
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:+EqG96vSGfyJZ26G6U1LI7nTD2enhjc+2VBnOqcUERVIim:+46KcyJI6G6uU7/LhjlkhQR7m
                                                                                                                                                                                          MD5:048AFE69735F6974D2CA7384B879820C
                                                                                                                                                                                          SHA1:267A9520C4390221DCE50177E789A4EBD590F484
                                                                                                                                                                                          SHA-256:E538F8F4934CA6E1CE29416D292171F28E67DA6C72ED9D236BA42F37445EA41E
                                                                                                                                                                                          SHA-512:201DA67A52DADA3AE7C533DE49D3C08A9465F7AA12317A0AE90A8C9C04AA69A85EC00AF2D0069023CD255DDA8768977C03C73516E4848376250E8D0D53D232CB
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:GIF89ad.d...................RJJ...B99.......RBB..B11ZBB!....R991!!...)....{{B!!R)).JJ.ss.ZZ.BB.kk.RR.JJ.BB9...JJR!!.ZZ.BB.11.99.{s.sk.kc.cZ.ZR.JB.ZR.JB.JB.RJ.B9.91.B9...{.JB.91.B9.B9.1){)!.)!.9)..ZR.JB{91.cR{1).ZJ.ZJ.RB.J9.B1.B1.9).1!....{B9.{k.scc1).kZZ)!c)!.9).B1.9).9).1!.1!.1!.B).9!.9!.1..).....{.sZ1)R)!.B1.B1.ZBR!..9).ZB.9).R9.R9.1!.J1.J1.B).B).9!.9!.1..1..).....sZ.J9.ZB.cJJ!.{1!.B).9!{)..9!.J).B!.B!.9..R1).kJ)!.B1{9).R9.cB.Z9.Z9.B).Z9.B).R1.9!.R1.J).J).B!.1..9....{.s.J9.{Z.ZB.sR.kJk1!.cB.cB.R1.R).1..B!.J!.B.....R91.J1).c.kJ.J).Z1.B!.B!..9!..{R.sJ.Z9.R1{9!..s.R9.Z...J91Z9){B)...............B91..1)!..............................RJR............B)1......R19........BJ.9B..{..s{......!.......,....d.d.@............0@PHa....*.p...7.8.y...C.s6Z.%Q.#s.`:B.N....4jd.K.0..|y....F@.......1~ ......'Y.B"C&R.V.R.4$k.3...D.......Ef*Y3..M........BDV._.....\..).]..>s..$H\%y0WL...d.......D..'..v..1Kz.Zp$;S
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2307
                                                                                                                                                                                          Entropy (8bit):5.135743409565932
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:XU/zAcKT6yOCaDBfsHLk32s3J5w83KDyP1BXy3JQz7yuC:XNc+92sg3A8uyDXy3JQnDC
                                                                                                                                                                                          MD5:F090D9B312C16489289FD39813412164
                                                                                                                                                                                          SHA1:1BEC6668F6549771DADC67D153B89B8F77DCD4B9
                                                                                                                                                                                          SHA-256:0D1E4405F6273F091732764ED89B57066BE63CE64869BE6C71EA337DC4F2F9B5
                                                                                                                                                                                          SHA-512:57B323589C5A8D9CBB224416731D8CE65C4B94146DF15CE30885DF63B1D0B3F709093B65390A911F84F20B7C5DE3C0AF9B4D7D531742BE046EDA6E8C3432EF6E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:This software is copyrighted by the Regents of the University of..California, Sun Microsystems, Inc., Scriptics Corporation, ActiveState..Corporation, Apple Inc. and other parties. The following terms apply to..all files associated with the software unless explicitly disclaimed in..individual files.....The authors hereby grant permission to use, copy, modify, distribute,..and license this software and its documentation for any purpose, provided..that existing copyright notices are retained in all copies and that this..notice is included verbatim in any distributions. No written agreement,..license, or royalty fee is required for any of the authorized uses...Modifications to this software may be copyrighted by their authors..and need not follow the licensing terms described here, provided that..the new terms are clearly indicated on the first page of each file where..they apply.....IN NO EVENT SHALL THE AUTHORS OR DISTRIBUTORS BE LIABLE TO ANY PARTY..FOR DIRECT, INDIRECT, SPECIAL, INCI
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):15255
                                                                                                                                                                                          Entropy (8bit):4.9510475386072095
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:apDYV5Yupn5OcckwBv3HCpg2J8JvJBfWeZhXkz+WkHGowv:aPPkevB2JuvJ9D3XmSc
                                                                                                                                                                                          MD5:804E6DCE549B2E541986C0CE9E75E2D1
                                                                                                                                                                                          SHA1:C44EE09421F127CF7F4070A9508F22709D06D043
                                                                                                                                                                                          SHA-256:47C75F9F8348BF8F2C086C57B97B73741218100CA38D10B8ABDF2051C95B9801
                                                                                                                                                                                          SHA-512:029426C4F659848772E6BB1D8182EB03D2B43ADF68FCFCC1EA1C2CC7C883685DEDA3FFFDA7E071912B9BDA616AD7AF2E1CB48CE359700C1A22E1E53E81CAE34B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# listbox.tcl --..#..# This file defines the default bindings for Tk listbox widgets..# and provides procedures that help in implementing those bindings...#..# Copyright (c) 1994 The Regents of the University of California...# Copyright (c) 1994-1995 Sun Microsystems, Inc...# Copyright (c) 1998 by Scriptics Corporation...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES.....#--------------------------------------------------------------------------..# tk::Priv elements used in this file:..#..# afterId -..Token returned by "after" for autoscanning...# listboxPrev -.The last element to be selected or deselected..#...during a selection operation...# listboxSelection -.All of the items that were selected before the..#...current selection operation (such as a mouse..#...drag) started; used to cancel an operation...#--------------------------------------------------------------------------....#--------------
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:Tcl script, ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):9862
                                                                                                                                                                                          Entropy (8bit):4.786615174847384
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:mvEEVwjVwqOpOLbkVAg/vyKEZ25YbKZbwrmQ:mvEEVwJwpALPgnyx25YGZkr3
                                                                                                                                                                                          MD5:D83ED6AC2912900040530528A0237AB3
                                                                                                                                                                                          SHA1:2D18E42A8B96C3D71C1C6701010FDF75C1E6D5D8
                                                                                                                                                                                          SHA-256:848258B946C002E2696CA3815A1589C8120AF5CC41FBC11BBD9A3F5754CC21AF
                                                                                                                                                                                          SHA-512:00B4CD0D58029FC37820C163A4AE1DEAD22FB5C767BDC118659EACE26D449C362189611DFB3FAB1AC129FABFEC2CE853EA2C10D418FAE5AEB91DDC9330FF782D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# megawidget.tcl..#..#.Basic megawidget support classes. Experimental for any use other than..#.the ::tk::IconList megawdget, which is itself only designed for use in..#.the Unix file dialogs...#..# Copyright (c) 2009-2010 Donal K. Fellows..#..# See the file "license.terms" for information on usage and redistribution of..# this file, and for a DISCLAIMER OF ALL WARRANTIES...#....package require Tk.....::oo::class create ::tk::Megawidget {.. superclass ::oo::class.. method unknown {w args} {...if {[string match .* $w]} {... [self] create $w {*}$args... return $w...}...next $w {*}$args.. }.. unexport new unknown.. self method create {name superclasses body} {...next $name [list \....superclass ::tk::MegawidgetClass {*}$superclasses]\;$body.. }..}....::oo::class create ::tk::MegawidgetClass {.. variable w hull options IdleCallbacks.. constructor args {...# Extract the "widget name" from the object name...set w [namespace tail [self]].....# Configure things...
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):39499
                                                                                                                                                                                          Entropy (8bit):4.928671503514817
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:NKJsO5OhIzOQjJwxzire5pKVjriecYyq4Cp5Zn2:NKJsO5LOQizire54lriecYf4V
                                                                                                                                                                                          MD5:078782CD05209012A84817AC6EF11450
                                                                                                                                                                                          SHA1:DBA04F7A6CF34C54A961F25E024B6A772C2B751D
                                                                                                                                                                                          SHA-256:D1283F67E435AAB0BDBE9FDAA540A162043F8D652C02FE79F3843A451F123D89
                                                                                                                                                                                          SHA-512:79A031F7732AEE6E284CD41991049F1BB715233E011562061CD3405E5988197F6A7FB5C2BBDDD1FB9B7024047F6003A2BF161FC0EC04876EFF5335C3710D9562
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# menu.tcl --..#..# This file defines the default bindings for Tk menus and menubuttons...# It also implements keyboard traversal of menus and implements a few..# other utility procedures related to menus...#..# Copyright (c) 1992-1994 The Regents of the University of California...# Copyright (c) 1994-1997 Sun Microsystems, Inc...# Copyright (c) 1998-1999 Scriptics Corporation...# Copyright (c) 2007 Daniel A. Steffen <das@users.sourceforge.net>..#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#-------------------------------------------------------------------------..# Elements of tk::Priv that are used in this file:..#..# cursor -..Saves the -cursor option for the posted menubutton...# focus -..Saves the focus during a menu selection operation...#...Focus gets restored here when the menu is unposted...# grabGlobal -..Used in conjunction with tk::Priv(oldGrab): if..#...tk::Priv(oldGrab) is non
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):30840
                                                                                                                                                                                          Entropy (8bit):5.142909056222569
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:+c4g8rSnBGzHsGK83Ch0x/0kmSq6O4+rNfPCpM2sEmqKys3pCJxi5dEaY:+c4g8OnBGzBK83Ch0x/0FSq6OnrGM2h3
                                                                                                                                                                                          MD5:983C7B78F1A0EBACAB8006D391A01FCD
                                                                                                                                                                                          SHA1:7EA37474EA039ED7A37BFDD7D76EAE673E666283
                                                                                                                                                                                          SHA-256:C5BDCA3ABA671F03DC4624AB5FD260490F5002491D6C619142CCF5A1A744528A
                                                                                                                                                                                          SHA-512:A006EF9B7213E572F6FC540D1512A52C52FEC44E3A07846DE09662AE32B7191C5CF639798531847B39E4076BF9DD6314B6F5373065C04F4FEF221185B39C3117
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# mkpsenc.tcl --..#..# This file generates the postscript prolog used by Tk.....namespace eval ::tk {.. # Creates Postscript encoding vector for ISO-8859-1 (could theoretically.. # handle any 8-bit encoding, but Tk never generates characters outside.. # ASCII)... #.. proc CreatePostscriptEncoding {} {...variable psglyphs...# Now check for known. Even if it is known, it can be other than we...# need. GhostScript seems to be happy with such approach...set result "\[\n"...for {set i 0} {$i<256} {incr i 8} {... for {set j 0} {$j<8} {incr j} {....set enc [encoding convertfrom "iso8859-1" \.....[format %c [expr {$i+$j}]]]....catch {.... set hexcode {}.... set hexcode [format %04X [scan $enc %c]]....}....if {[info exists psglyphs($hexcode)]} {.... append result "/$psglyphs($hexcode)"....} else {.... append result "/space"....}... }... append result "\n"...}...append result "\]"...return $result.. }.... # List of adobe glyph names. Converted from glyph
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:xbm image (32x, ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):16786
                                                                                                                                                                                          Entropy (8bit):4.717927930017041
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:+haZOxBpK8uxGe4V88/wxY3Fxqipz4zz4zxxFzxT4OcErDxqdRRZeuC/Vj2CoopC:+hRWRG3FFjvsfCoopwITHzLHFHHAABs
                                                                                                                                                                                          MD5:217087AB6B2A8F9D7252E311D69C3769
                                                                                                                                                                                          SHA1:09AEB2BC5B7C7F4AB3DE4211D786C519AE0970F6
                                                                                                                                                                                          SHA-256:A07E3A3809CED3C6C9C1E171DCA5AD1F28357734CD41B2B9DD9F58085B3D2842
                                                                                                                                                                                          SHA-512:6E57633C924BFC16D380C014C20DD24D5727E70D4843FCEC4D7995B4DB21941EA8F2A5FD6E5386DF3364B6905D4D66B2B9595DC8FC70CFF40A2D49A92A1B6FBA
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# msgbox.tcl --..#..#.Implements messageboxes for platforms that do not have native..#.messagebox support...#..# Copyright (c) 1994-1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# Ensure existence of ::tk::dialog namespace..#..namespace eval ::tk::dialog {}....image create bitmap ::tk::dialog::b1 -foreground black \..-data "#define b1_width 32\n#define b1_height 32..static unsigned char q1_bits[] = {.. 0x00, 0xf8, 0x1f, 0x00, 0x00, 0x07, 0xe0, 0x00, 0xc0, 0x00, 0x00, 0x03,.. 0x20, 0x00, 0x00, 0x04, 0x10, 0x00, 0x00, 0x08, 0x08, 0x00, 0x00, 0x10,.. 0x04, 0x00, 0x00, 0x20, 0x02, 0x00, 0x00, 0x40, 0x02, 0x00, 0x00, 0x40,.. 0x01, 0x00, 0x00, 0x80, 0x01, 0x00, 0x00, 0x80, 0x01, 0x00, 0x00, 0x80,.. 0x01, 0x00, 0x00, 0x80, 0x01, 0x00, 0x00, 0x80, 0x01, 0x00, 0x00, 0x80,.. 0x01, 0x00, 0x00, 0x80, 0x02, 0x00, 0x00, 0x40, 0x02, 0x00, 0x00, 0x40,.. 0x04, 0x00,
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):4235
                                                                                                                                                                                          Entropy (8bit):4.789130604359491
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:nlw9Twd+j3gLhokqwX+hTnJgNanPNcgRhgP+5QPwJJENL:nlw9TjjwI3hTnJgNaRhgP75L
                                                                                                                                                                                          MD5:5A8B46B85DCCBF74E2B5B820E1A7B9D1
                                                                                                                                                                                          SHA1:980F4FC5BABA82BA0FE02F9BD03A23DF6D565BB1
                                                                                                                                                                                          SHA-256:4DFFBEEDBF0D66D84B13088016D1A782CEAAD4DED27BE1E38842F8969C0E533F
                                                                                                                                                                                          SHA-512:2D81FC06CF3C20E4F6314BD13AF81FDE38A9B06510584C84C6A0C8C36314F980F77D02BD8056E7EE5DE599A0620E0C0349124147334B9C141145270046B19D90
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:namespace eval ::tk {.. ::msgcat::mcset cs "&Abort" "&P\u0159eru\u0161it".. ::msgcat::mcset cs "&About..." "&O programu...".. ::msgcat::mcset cs "All Files" "V\u0161echny soubory".. ::msgcat::mcset cs "Application Error" "Chyba programu".. ::msgcat::mcset cs "Bold Italic".. ::msgcat::mcset cs "&Blue" "&Modr\341".. ::msgcat::mcset cs "Cancel" "Zru\u0161it".. ::msgcat::mcset cs "&Cancel" "&Zru\u0161it".. ::msgcat::mcset cs "Cannot change to the directory \"%1\$s\".\nPermission denied." "Nemohu zm\u011bnit atku\341ln\355 adres\341\u0159 na \"%1\$s\".\nP\u0159\355stup odm\355tnut.".. ::msgcat::mcset cs "Choose Directory" "V\375b\u011br adres\341\u0159e".. ::msgcat::mcset cs "Cl&ear" "Sma&zat".. ::msgcat::mcset cs "&Clear Console" "&Smazat konzolu".. ::msgcat::mcset cs "Color" "Barva".. ::msgcat::mcset cs "Console" "Konzole".. ::msgcat::mcset cs "&Copy" "&Kop\355rovat".. ::msgcat::mcset cs "Cu&t" "V&y\u0159\355znout".. ::msgcat::mcset cs "&
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):3987
                                                                                                                                                                                          Entropy (8bit):4.651948695787255
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:nRZ2uDMr05sIEzs2KkrT+XuTKN0FjDDP9:nRZzDy4kBKkrT+QpP9
                                                                                                                                                                                          MD5:227B0F255F854460E8E5146ED7A17B85
                                                                                                                                                                                          SHA1:99A080CAD631F21963C51A5B254BDAD3724DC866
                                                                                                                                                                                          SHA-256:FEEF8F8AD33BB3362C845A25D6ED273C398051047D899B31790474614C7AFD2D
                                                                                                                                                                                          SHA-512:36A4B48831316CC29686CC76DA00110EB078EC56F55A960D11AE427AA3D913C340C1E3805BF2AD40C1A8A92FC6587DA5D2C245E7501289FC3E228BE14FE49598
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:namespace eval ::tk {.. ::msgcat::mcset da "&Abort" "&Afbryd".. ::msgcat::mcset da "&About..." "&Om...".. ::msgcat::mcset da "All Files" "Alle filer".. ::msgcat::mcset da "Application Error" "Programfejl".. ::msgcat::mcset da "&Blue" "&Bl\u00E5".. ::msgcat::mcset da "Cancel" "Annuller".. ::msgcat::mcset da "&Cancel" "&Annuller".. ::msgcat::mcset da "Cannot change to the directory \"%1\$s\".\nPermission denied." "Kan ikke skifte til katalog \"%1\$s\".\nIngen rettigheder.".. ::msgcat::mcset da "Choose Directory" "V\u00E6lg katalog".. ::msgcat::mcset da "Cl&ear" "&Ryd".. ::msgcat::mcset da "&Clear Console" "&Ryd konsolen".. ::msgcat::mcset da "Color" "Farve".. ::msgcat::mcset da "Console" "Konsol".. ::msgcat::mcset da "&Copy" "&Kopier".. ::msgcat::mcset da "Cu&t" "Kli&p".. ::msgcat::mcset da "&Delete" "&Slet".. ::msgcat::mcset da "Details >>" "Detailer".. ::msgcat::mcset da "Directory \"%1\$s\" does not exist." "Katalog \"%1\$s\" finde
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):4914
                                                                                                                                                                                          Entropy (8bit):4.6221938909259475
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:nxLEpatioUqGBLbz4ME/XKKVN9R7S/0oYr9:epY3MkXKKxRu2r9
                                                                                                                                                                                          MD5:2203F65BCDA61BC15AEAC4F868C6D94A
                                                                                                                                                                                          SHA1:C4CC3975679D23892406E4E8971359A0775B1B86
                                                                                                                                                                                          SHA-256:C0F574B14068A049E93421C73873D750C98DE28B7B77AA42FE72CBE0270A4186
                                                                                                                                                                                          SHA-512:79F134FDAD3B12524D43BF9F59D3C04CAE30A95F591A51B82C8DF7CC8563BEA5D464AEECC457D9F60C04365E30459C447ED537AFC832BA25E1815DE06C2B81E5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:namespace eval ::tk {.. ::msgcat::mcset de "&Abort" "&Abbruch".. ::msgcat::mcset de "&About..." "&\u00dcber...".. ::msgcat::mcset de "All Files" "Alle Dateien".. ::msgcat::mcset de "Application Error" "Applikationsfehler".. ::msgcat::mcset de "&Apply" "&Anwenden".. ::msgcat::mcset de "Bold" "Fett".. ::msgcat::mcset de "Bold Italic" "Fett kursiv".. ::msgcat::mcset de "&Blue" "&Blau".. ::msgcat::mcset de "Cancel" "Abbruch".. ::msgcat::mcset de "&Cancel" "&Abbruch".. ::msgcat::mcset de "Cannot change to the directory \"%1\$s\".\nPermission denied." "Kann nicht in das Verzeichnis \"%1\$s\" wechseln.\nKeine Rechte vorhanden.".. ::msgcat::mcset de "Choose Directory" "W\u00e4hle Verzeichnis".. ::msgcat::mcset de "Cl&ear" "&R\u00fccksetzen".. ::msgcat::mcset de "&Clear Console" "&Konsole l\u00f6schen".. ::msgcat::mcset de "Color" "Farbe".. ::msgcat::mcset de "Console" "Konsole".. ::msgcat::mcset de "&Copy" "&Kopieren".. ::msgcat::mcset de "
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with very long lines (355), with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8784
                                                                                                                                                                                          Entropy (8bit):4.334043617395095
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:tVj/F+oxBHbkI8+xTqFt2zPJ0k63fRGIUvPXrfBNnzc+zIF7meUOT7GC8MO07S0g:fj9+AHlLoozHn7fBFrMVmehCAGb
                                                                                                                                                                                          MD5:780F863903BBDAA6C371EC0D3C7E6D59
                                                                                                                                                                                          SHA1:DF5D435E132BEE4C076A7FC577C8C275A8B68CD5
                                                                                                                                                                                          SHA-256:3F6F155864FE59A341BFD869735E54DD21CEE21BBD038433D9B271AD77BA3F7E
                                                                                                                                                                                          SHA-512:091965EE912513AE1943BE840A2E757188FBA6F760F7C47BE80D06313D59B051F183E3A29D4B1CEDE1F9E54CA3CA23D75FF2C3A3672A4E71FB56F0FA76F7FA0D
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:## Messages for the Greek (Hellenic - "el") language...## Please report any changes/suggestions to:..## petasis@iit.demokritos.gr....namespace eval ::tk {.. ::msgcat::mcset el "&Abort" "\u03a4\u03b5\u03c1\u03bc\u03b1\u03c4\u03b9\u03c3\u03bc\u03cc\u03c2".. ::msgcat::mcset el "About..." "\u03a3\u03c7\u03b5\u03c4\u03b9\u03ba\u03ac...".. ::msgcat::mcset el "All Files" "\u038c\u03bb\u03b1 \u03c4\u03b1 \u0391\u03c1\u03c7\u03b5\u03af\u03b1".. ::msgcat::mcset el "Application Error" "\u039b\u03ac\u03b8\u03bf\u03c2 \u0395\u03c6\u03b1\u03c1\u03bc\u03bf\u03b3\u03ae\u03c2".. ::msgcat::mcset el "&Blue" "\u039c\u03c0\u03bb\u03b5".. ::msgcat::mcset el "&Cancel" "\u0391\u03ba\u03cd\u03c1\u03c9\u03c3\u03b7".. ::msgcat::mcset el \.."Cannot change to the directory \"%1\$s\".\nPermission denied." \.."\u0394\u03b5\u03bd \u03b5\u03af\u03bd\u03b1\u03b9 \u03b4\u03c5\u03bd\u03b1\u03c4\u03ae \u03b7 \u03b1\u03bb\u03bb\u03b1\u03b3\u
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):3377
                                                                                                                                                                                          Entropy (8bit):4.279601088621442
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:sQ7dw5bO0V3gqmCNyoKJ6iwp/uvENv4SKEcET2hsHFjr:n7dwNOc3RmOKJQcvEl4SK1ET2hYFjr
                                                                                                                                                                                          MD5:D48CFC9EC779085E8F6AAA7B1C40C89A
                                                                                                                                                                                          SHA1:0CF6253BFF39F40CA0991F9B06D3394BFEA21ED2
                                                                                                                                                                                          SHA-256:4A33B44B2E220E28EAAE7FAC407CAFE43D97C270DA58FA5F3B699A1760BFB2A4
                                                                                                                                                                                          SHA-512:C00EC0CFB48ABE621EF625C51952BCF177CE3BC7F0DEC5276EF84C9A97C7E014806B106EA8DEE202C43F8DD54ED7261A8D899E3EE12E3F37A90C387D864463AE
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:namespace eval ::tk {.. ::msgcat::mcset en "&Abort".. ::msgcat::mcset en "&About...".. ::msgcat::mcset en "All Files".. ::msgcat::mcset en "Application Error".. ::msgcat::mcset en "&Apply".. ::msgcat::mcset en "Bold".. ::msgcat::mcset en "Bold Italic".. ::msgcat::mcset en "&Blue".. ::msgcat::mcset en "Cancel".. ::msgcat::mcset en "&Cancel".. ::msgcat::mcset en "Cannot change to the directory \"%1\$s\".\nPermission denied.".. ::msgcat::mcset en "Choose Directory".. ::msgcat::mcset en "Cl&ear".. ::msgcat::mcset en "&Clear Console".. ::msgcat::mcset en "Color".. ::msgcat::mcset en "Console".. ::msgcat::mcset en "&Copy".. ::msgcat::mcset en "Cu&t".. ::msgcat::mcset en "&Delete".. ::msgcat::mcset en "Details >>".. ::msgcat::mcset en "Directory \"%1\$s\" does not exist.".. ::msgcat::mcset en "&Directory:".. ::msgcat::mcset en "&Edit".. ::msgcat::mcset en "Effects".. ::msgcat::mcset en "Error: %1\$s".. ::msgcat::mcs
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):66
                                                                                                                                                                                          Entropy (8bit):4.262228832346611
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3:fEGp6fRyv//mGoW8vMKEQXyVn:sooyv//xoQOOn
                                                                                                                                                                                          MD5:3D41FC47CD9936F817EF9645D73A77ED
                                                                                                                                                                                          SHA1:E62BBE094B71CAF4A389DE3ECD84D2EEFBA33827
                                                                                                                                                                                          SHA-256:01238293356E82F1D298896491F8B299BB7DC9C34F299C9E756254C736DA612B
                                                                                                                                                                                          SHA-512:B92582C32C4D7CD9DE6571CBB6B93DD693A8B5A80645468E2D02B80C339BE2B95D5B4878A0DA9AFFE9E2F98A6C38AAE9CC1FF2440146D0ED128FE8C9A92EECDB
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:namespace eval ::tk {.. ::msgcat::mcset en_gb Color Colour..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):3991
                                                                                                                                                                                          Entropy (8bit):4.605712650627941
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:n680lhrzes/QEkFH+nl0WXqQ+pISIKU/ujHMytuXcFSpxvy:n680XeqfkFelPXqVpISIKUWgRTy
                                                                                                                                                                                          MD5:E44F82EAF651D065CA1A2D5FA3C91C25
                                                                                                                                                                                          SHA1:F0EA1C39DED47232B21D0DCDD5179071C5717C55
                                                                                                                                                                                          SHA-256:37FC66686349A955935CB24B0BD524E91823D2A631E63D54FDF17733C7502CBE
                                                                                                                                                                                          SHA-512:A2ECA0A1C06406158CA8D2066639C0C6B582969D5F01C0559838E93A3AEFFFC50EB54B26328DAA81742016650FC790B1F81841E40EFE4F885626902D82989DD7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:namespace eval ::tk {.. ::msgcat::mcset eo "&Abort" "&\u0108esigo".. ::msgcat::mcset eo "&About..." "Pri...".. ::msgcat::mcset eo "All Files" "\u0108ioj dosieroj".. ::msgcat::mcset eo "Application Error" "Aplikoerraro".. ::msgcat::mcset eo "&Blue" "&Blua".. ::msgcat::mcset eo "Cancel" "Rezignu".. ::msgcat::mcset eo "&Cancel" "&Rezignu".. ::msgcat::mcset eo "Cannot change to the directory \"%1\$s\".\nPermission denied." "Neeble \u0109angi al dosierulon \"%1\$s\".\nVi ne rajtas tion.".. ::msgcat::mcset eo "Choose Directory" "Elektu Dosierujo".. ::msgcat::mcset eo "Cl&ear" "&Klaru".. ::msgcat::mcset eo "&Clear Console" "&Klaru konzolon".. ::msgcat::mcset eo "Color" "Farbo".. ::msgcat::mcset eo "Console" "Konzolo".. ::msgcat::mcset eo "&Copy" "&Kopiu".. ::msgcat::mcset eo "Cu&t" "&Enpo\u015digu".. ::msgcat::mcset eo "&Delete" "&Forprenu".. ::msgcat::mcset eo "Details >>" "Detaloj >>".. ::msgcat::mcset eo "Directory \"%1\$s\" does not ex
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):4024
                                                                                                                                                                                          Entropy (8bit):4.536517819515934
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:nN0T1Lt8ZYSih/aiik148aFscyTzoixccUTqjcg60Dx/H5:nN0BLSQUXy/o8re055
                                                                                                                                                                                          MD5:4765F3C055742530E4644771EBC6C69F
                                                                                                                                                                                          SHA1:8BEA722AC00522DEAA5B380AEEF4CA57D7A271BD
                                                                                                                                                                                          SHA-256:D2842B80F1B521EFF2D2656A69274B5F2A8F4F5831AF2E8EE73E3C37389F981F
                                                                                                                                                                                          SHA-512:9CA247F22797A1A1FCA42B5CDABF58262ED95EECDDD321CEB1440A60A4375923E0F511238F360D159EB5EED6F82CBBE0B8907A07CC77DB831BF97082932CD0FD
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:namespace eval ::tk {.. ::msgcat::mcset es "&Abort" "&Abortar".. ::msgcat::mcset es "&About..." "&Acerca de ...".. ::msgcat::mcset es "All Files" "Todos los archivos".. ::msgcat::mcset es "Application Error" "Error de la aplicaci\u00f3n".. ::msgcat::mcset es "&Blue" "&Azul".. ::msgcat::mcset es "Cancel" "Cancelar".. ::msgcat::mcset es "&Cancel" "&Cancelar".. ::msgcat::mcset es "Cannot change to the directory \"%1\$s\".\nPermission denied." "No es posible acceder al directorio \"%1\$s\".\nPermiso denegado.".. ::msgcat::mcset es "Choose Directory" "Elegir directorio".. ::msgcat::mcset es "Cl&ear" "&Borrar".. ::msgcat::mcset es "&Clear Console" "&Borrar consola".. ::msgcat::mcset es "Color".. ::msgcat::mcset es "Console" "Consola".. ::msgcat::mcset es "&Copy" "&Copiar".. ::msgcat::mcset es "Cu&t" "Cor&tar".. ::msgcat::mcset es "&Delete" "&Borrar".. ::msgcat::mcset es "Details >>" "Detalles >>".. ::msgcat::mcset es "Directory \"%1\$s\"
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):3877
                                                                                                                                                                                          Entropy (8bit):4.630737553723335
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:nByEWs/3lHFB9FamsIfSAzZ2eaISAxh0BRc3jC:nByEWaRNzsSSWonMAv
                                                                                                                                                                                          MD5:E279E5FFF03E1B8E9063ABC8A499A6BD
                                                                                                                                                                                          SHA1:80910911F6B4830BA4DCBA9A9EAD12C9F802DDC9
                                                                                                                                                                                          SHA-256:3F2CEB4A33695AB6B56E27F61A4C60C029935BB026497D99CB2C246BCB4A63C4
                                                                                                                                                                                          SHA-512:8333388E421AC3F342317BEBE352809B0B190EF8B044A0BAE2FE4051974D86008BAFDCB7098E9DC39A8D9E1E08FB87F54B9D3388AF2D0185FF913DB6788C5AB5
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:namespace eval ::tk {.. ::msgcat::mcset fr "&Abort" "&Annuler".. ::msgcat::mcset fr "About..." "\u00c0 propos...".. ::msgcat::mcset fr "All Files" "Tous les fichiers".. ::msgcat::mcset fr "Application Error" "Erreur d'application".. ::msgcat::mcset fr "&Blue" "&Bleu".. ::msgcat::mcset fr "Cancel" "Annuler".. ::msgcat::mcset fr "&Cancel" "&Annuler".. ::msgcat::mcset fr "Cannot change to the directory \"%1\$s\".\nPermission denied." "Impossible d'acc\u00e9der au r\u00e9pertoire \"%1\$s\".\nPermission refus\u00e9e.".. ::msgcat::mcset fr "Choose Directory" "Choisir r\u00e9pertoire".. ::msgcat::mcset fr "Cl&ear" "Effacer".. ::msgcat::mcset fr "Color" "Couleur".. ::msgcat::mcset fr "Console".. ::msgcat::mcset fr "Copy" "Copier".. ::msgcat::mcset fr "Cu&t" "Couper".. ::msgcat::mcset fr "Delete" "Effacer".. ::msgcat::mcset fr "Details >>" "D\u00e9tails >>".. ::msgcat::mcset fr "Directory \"%1\$s\" does not exist." "Le r\u00e9pertoire \"%1\$s\"
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):4678
                                                                                                                                                                                          Entropy (8bit):4.7955991577265245
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:nkCEz2TTrKmA17fzq/Hj+pUva+fQR/a5a/Thn5kU:kTqM17u/8NiMrhb
                                                                                                                                                                                          MD5:4F1610E0C73DAE668E3F9D9235631152
                                                                                                                                                                                          SHA1:63EE54A6C1A69B798C65C999D5F80A7AB252B6D8
                                                                                                                                                                                          SHA-256:E063AD7CA93F37728A65E4CD7C0433950F22607D307949F6CB056446AFEAA4FE
                                                                                                                                                                                          SHA-512:37F4B8A9CD020A77591C09AF40FBC2FA82107B2596D31B5F30CE6ECAA225417CF7A5C62FB7A93539B0D7E930D0A44F9BF2EE6BE113F831B0A72B229444672AFD
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:namespace eval ::tk {.. ::msgcat::mcset hu "&Abort" "&Megszak\u00edt\u00e1s".. ::msgcat::mcset hu "&About..." "N\u00e9vjegy...".. ::msgcat::mcset hu "All Files" "Minden f\u00e1jl".. ::msgcat::mcset hu "Application Error" "Alkalmaz\u00e1s hiba".. ::msgcat::mcset hu "&Blue" "&K\u00e9k".. ::msgcat::mcset hu "Cancel" "M\u00e9gsem".. ::msgcat::mcset hu "&Cancel" "M\u00e9g&sem".. ::msgcat::mcset hu "Cannot change to the directory \"%1\$s\".\nPermission denied." "A k\u00f6nyvt\u00e1rv\u00e1lt\u00e1s nem siker\u00fclt: \"%1\$s\".\nHozz\u00e1f\u00e9r\u00e9s megtagadva.".. ::msgcat::mcset hu "Choose Directory" "K\u00f6nyvt\u00e1r kiv\u00e1laszt\u00e1sa".. ::msgcat::mcset hu "Cl&ear" "T\u00f6rl\u00e9s".. ::msgcat::mcset hu "&Clear Console" "&T\u00f6rl\u00e9s Konzol".. ::msgcat::mcset hu "Color" "Sz\u00edn".. ::msgcat::mcset hu "Console" "Konzol".. ::msgcat::mcset hu "&Copy" "&M\u00e1sol\u00e1s".. ::msgcat::mcset hu "Cu&t" "&Kiv\u00e1g\u00e1s".. ::ms
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):3765
                                                                                                                                                                                          Entropy (8bit):4.49679862548805
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:nmU4xnonTjwUE5Xs6ZrT8BpXAg+Wr+u92C8t7mU9nUSs:nZ4FonFE58HBpXjr+fBJs
                                                                                                                                                                                          MD5:B74C54666A5A431A782DB691B4CA3315
                                                                                                                                                                                          SHA1:2BC63982C14BBA8A4C451CE31540181F40CE2216
                                                                                                                                                                                          SHA-256:806930F283FD097195C7850E3486B3815D1564529B4F8E5FA6D26F3175183BC1
                                                                                                                                                                                          SHA-512:8120E2FFD14E0A992E254796ADDC0DC995C921BE31688C0995D7A36FE82609D78791FEF73EAF5B14E2F0D40AD256AB8DAAA07C18E6950362B28E40B71E47C0B6
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:namespace eval ::tk {.. ::msgcat::mcset it "&Abort" "&Interrompi".. ::msgcat::mcset it "&About..." "Informazioni...".. ::msgcat::mcset it "All Files" "Tutti i file".. ::msgcat::mcset it "Application Error" "Errore dell' applicazione".. ::msgcat::mcset it "&Blue" "&Blu".. ::msgcat::mcset it "Cancel" "Annulla".. ::msgcat::mcset it "&Cancel" "&Annulla".. ::msgcat::mcset it "Cannot change to the directory \"%1\$s\".\nPermission denied." "Impossibile accedere alla directory \"%1\$s\".\nPermesso negato.".. ::msgcat::mcset it "Choose Directory" "Scegli una directory".. ::msgcat::mcset it "Cl&ear" "Azzera".. ::msgcat::mcset it "&Clear Console" "Azzera Console".. ::msgcat::mcset it "Color" "Colore".. ::msgcat::mcset it "Console".. ::msgcat::mcset it "&Copy" "Copia".. ::msgcat::mcset it "Cu&t" "Taglia".. ::msgcat::mcset it "Delete" "Cancella".. ::msgcat::mcset it "Details >>" "Dettagli >>".. ::msgcat::mcset it "Directory \"%1\$s\" does not ex
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):4557
                                                                                                                                                                                          Entropy (8bit):4.524344068436489
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:nucQswBju0x0M4U2z9KSSOzZL5KhWTqGGIrlxXvhYbL/ZO5NT+T4kiLzzdDf1SDM:nLGa0x0Mp2KSHKSv2bL/ZO5u6nRfAXU9
                                                                                                                                                                                          MD5:E56229BAC5A8ABB90C4DD8EE3F9FF9F8
                                                                                                                                                                                          SHA1:7527D6C3C6C84BFF0E683FFA86A21C58458EB55D
                                                                                                                                                                                          SHA-256:0914FBA42361227D14FA281E8A9CBF57C16200B4DA1E61CC3402EF0113A512C7
                                                                                                                                                                                          SHA-512:13649DDB06DB4BA9E39BEAF828211086A519444DA9AB5CBDD1B88B29208388189A5141F75AD94B56A348EDDE534FFADE8B19B557CB988EA4ECC9A84B135D36C1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:namespace eval ::tk {.. ::msgcat::mcset nl "&Abort" "&Afbreken".. ::msgcat::mcset nl "&About..." "Over...".. ::msgcat::mcset nl "All Files" "Alle Bestanden".. ::msgcat::mcset nl "Application Error" "Toepassingsfout".. ::msgcat::mcset nl "&Apply" "Toepassen".. ::msgcat::mcset nl "Bold" "Vet".. ::msgcat::mcset nl "Bold Italic" "Vet Cursief".. ::msgcat::mcset nl "&Blue" "&Blauw".. ::msgcat::mcset nl "Cancel" "Annuleren".. ::msgcat::mcset nl "&Cancel" "&Annuleren".. ::msgcat::mcset nl "Cannot change to the directory \"%1\$s\".\nPermission denied." "Kan niet naar map \"%1\$s\" gaan.\nU heeft hiervoor geen toestemming.".. ::msgcat::mcset nl "Choose Directory" "Kies map".. ::msgcat::mcset nl "Cl&ear" "Wissen".. ::msgcat::mcset nl "&Clear Console" "&Wis Console".. ::msgcat::mcset nl "Color" "Kleur".. ::msgcat::mcset nl "Console".. ::msgcat::mcset nl "&Copy" "Kopi\u00ebren".. ::msgcat::mcset nl "Cu&t" "Knippen".. ::msgcat::mcset nl "&Dele
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):4932
                                                                                                                                                                                          Entropy (8bit):4.799369674927008
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:nXra9E310fwNCeVsvSmy6MZv8lWBTDGdZ3tojTyrEQmAUCIx4wBxZ:n7a9Q0fyw5MQWgP3uoZChB3
                                                                                                                                                                                          MD5:8CFA2E38822303FDCB55AE3277F0B81B
                                                                                                                                                                                          SHA1:447F28A5064FCEA019C60B3F9B6D50CD43C2D0E3
                                                                                                                                                                                          SHA-256:EACEB1F08DE0863CCF726881E07FE5B135EA09646C5253E0CBF7DDB987EB0D92
                                                                                                                                                                                          SHA-512:E38BA9059AFF55C2B22A4AE24D6A76149C76DBA8BF8646AE81D6E07D7ED490D0605034B29D9AC848E6685C8EC26A3DBE5B2EAF462B14D96376E80076FBE7082A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:namespace eval ::tk {.. ::msgcat::mcset pl "&Abort" "&Przerwij".. ::msgcat::mcset pl "&About..." "O programie...".. ::msgcat::mcset pl "All Files" "Wszystkie pliki".. ::msgcat::mcset pl "Application Error" "B\u0142\u0105d w programie".. ::msgcat::mcset pl "&Apply" "Zastosuj".. ::msgcat::mcset pl "Bold" "Pogrubienie".. ::msgcat::mcset pl "Bold Italic" "Pogrubiona kursywa".. ::msgcat::mcset pl "&Blue" "&Niebieski".. ::msgcat::mcset pl "Cancel" "Anuluj".. ::msgcat::mcset pl "&Cancel" "&Anuluj".. ::msgcat::mcset pl "Cannot change to the directory \"%1\$s\".\nPermission denied." "Nie mo\u017cna otworzy\u0107 katalogu \"%1\$s\".\nOdmowa dost\u0119pu.".. ::msgcat::mcset pl "Choose Directory" "Wybierz katalog".. ::msgcat::mcset pl "Cl&ear" "&Wyczy\u015b\u0107".. ::msgcat::mcset pl "&Clear Console" "&Wyczy\u015b\u0107 konsol\u0119".. ::msgcat::mcset pl "Color" "Kolor".. ::msgcat::mcset pl "Console" "Konsola".. ::msgcat::mcset pl "&Copy" "&Kopiu
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):3987
                                                                                                                                                                                          Entropy (8bit):4.63232183429232
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:nHOT1mM5qHHxiBHb3joTjtcp2UqMxweo6VvilCMKKXx9vjM:nHOT1mMQnwB/otcUUpGX6VPVoLjM
                                                                                                                                                                                          MD5:4018686F2A8E299D86BDB1478BC97896
                                                                                                                                                                                          SHA1:0EECE3D57F2EA5EECE8157B06F3AFB97E1F2551A
                                                                                                                                                                                          SHA-256:D687F71F0432BB0D02EFDF576E526D2C19D4136F76C41A3224A2F034168F3F34
                                                                                                                                                                                          SHA-512:4D730068B2A21E1D6004205B10A9D0D5EE9683FEB03B6FB673E8B9B94ED6BE468086A52DFE97C4DBF35A07CBB2C5E276DF0952A06C78E029D53D796CB6FCC8DF
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:namespace eval ::tk {.. ::msgcat::mcset pt "&Abort" "&Abortar".. ::msgcat::mcset pt "About..." "Sobre ...".. ::msgcat::mcset pt "All Files" "Todos os arquivos".. ::msgcat::mcset pt "Application Error" "Erro de aplica\u00e7\u00e3o".. ::msgcat::mcset pt "&Blue" "&Azul".. ::msgcat::mcset pt "Cancel" "Cancelar".. ::msgcat::mcset pt "&Cancel" "&Cancelar".. ::msgcat::mcset pt "Cannot change to the directory \"%1\$s\".\nPermission denied." "N\u00e3o foi poss\u00edvel mudar para o diret\u00f3rio \"%1\$s\".\nPermiss\u00e3o negada.".. ::msgcat::mcset pt "Choose Directory" "Escolha um diret\u00f3rio".. ::msgcat::mcset pt "Cl&ear" "Apagar".. ::msgcat::mcset pt "&Clear Console" "Apagar Console".. ::msgcat::mcset pt "Color" "Cor".. ::msgcat::mcset pt "Console".. ::msgcat::mcset pt "&Copy" "Copiar".. ::msgcat::mcset pt "Cu&t" "Recortar".. ::msgcat::mcset pt "&Delete" "Excluir".. ::msgcat::mcset pt "Details >>" "Detalhes >>".. ::msgcat::mcset pt "D
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7289
                                                                                                                                                                                          Entropy (8bit):4.396417984959623
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:n9MEBG2T4YHCIxqEMk0Y2xX6wKl9zFAWS2yuV9cDcPRjnHQuNFNfz5hVV9aWTRcD:dreFqN1T+oRR/F1RHR6
                                                                                                                                                                                          MD5:803E0F9930828B103B03B55EDA173CB8
                                                                                                                                                                                          SHA1:429A30A7546123B1895C4317C65A97EBCBD16F35
                                                                                                                                                                                          SHA-256:8715E9927BA925AE8099EDF71A3D701FE396FC0E4DF039CEA7DC84120E101F47
                                                                                                                                                                                          SHA-512:379739A2C84E35C1AC70EFA9F704D3D1455741FEB60F4A1D9B0E0FD6CC3279F66A0C63C0FADFD861498D3FE13AB9E633F2C1BB05E76B3206DECEA253FFB8E33C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:namespace eval ::tk {.. ::msgcat::mcset ru "&Abort" "&\u041e\u0442\u043c\u0435\u043d\u0438\u0442\u044c".. ::msgcat::mcset ru "&About..." "\u041f\u0440\u043e...".. ::msgcat::mcset ru "All Files" "\u0412\u0441\u0435 \u0444\u0430\u0439\u043b\u044b".. ::msgcat::mcset ru "Application Error" "\u041e\u0448\u0438\u0431\u043a\u0430 \u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0435".. ::msgcat::mcset ru "&Blue" " &\u0413\u043e\u043b\u0443\u0431\u043e\u0439".. ::msgcat::mcset ru "Cancel" "\u041e\u0442&\u043c\u0435\u043d\u0430".. ::msgcat::mcset ru "&Cancel" "\u041e\u0442&\u043c\u0435\u043d\u0430".. ::msgcat::mcset ru "Cannot change to the directory \"%1\$s\".\nPermission denied." \....."\u041d\u0435 \u043c\u043e\u0433\u0443 \u043f\u0435\u0440\u0435\u0439\u0442\u0438 \u0432 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 \"%1\$s\".\n\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043f\u0440\u0430\u0432 \u0434\u043e\u0441\u0442\u0443\u043f\u
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):3908
                                                                                                                                                                                          Entropy (8bit):4.658068191079967
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:nT8A5cbwKmtI1sE9xt6BDyepTr2iiK/yGqXZlBp9:nD5cb2extDepTCnVpJ9
                                                                                                                                                                                          MD5:1D085A672A6FCDECEF5D7D876E4C74A3
                                                                                                                                                                                          SHA1:1A40C03F15A6926359CA3E5C0A809485CAD28AEE
                                                                                                                                                                                          SHA-256:A6821A13D34FB31F1827294B82C4BF9586BB255CA14F78C3ACE11181F42EF211
                                                                                                                                                                                          SHA-512:981EDEEF5E4C915BB8F10044096B412D1855CAD08F98A448C6C0A49A54222945EBD102DDCB9525535E0FB19313C319155FA59384605B2C36CC8B4A58693D57E7
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:namespace eval ::tk {.. ::msgcat::mcset sv "&Abort" "&Avsluta".. ::msgcat::mcset sv "&About..." "&Om...".. ::msgcat::mcset sv "All Files" "Samtliga filer".. ::msgcat::mcset sv "Application Error" "Programfel".. ::msgcat::mcset sv "&Blue" "&Bl\u00e5".. ::msgcat::mcset sv "Cancel" "Avbryt".. ::msgcat::mcset sv "&Cancel" "&Avbryt".. ::msgcat::mcset sv "Cannot change to the directory \"%1\$s\".\nPermission denied." "Kan ej n\u00e5 mappen \"%1\$s\".\nSaknar r\u00e4ttigheter.".. ::msgcat::mcset sv "Choose Directory" "V\u00e4lj mapp".. ::msgcat::mcset sv "Cl&ear" "&Radera".. ::msgcat::mcset sv "&Clear Console" "&Radera konsollen".. ::msgcat::mcset sv "Color" "F\u00e4rg".. ::msgcat::mcset sv "Console" "Konsoll".. ::msgcat::mcset sv "&Copy" "&Kopiera".. ::msgcat::mcset sv "Cu&t" "Klipp u&t".. ::msgcat::mcset sv "&Delete" "&Radera".. ::msgcat::mcset sv "Details >>" "Detaljer >>".. ::msgcat::mcset sv "Directory \"%1\$s\" does not exist." "Mapp
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):5772
                                                                                                                                                                                          Entropy (8bit):5.038729016734604
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:onzxtm7EMgdMjwPqeuAmz9LD1kFIQETZqoIK/RLf7w:ozxtm7qUwi79l0sZqoBJLDw
                                                                                                                                                                                          MD5:FC9E03823BEB08DAF7681C09D106DF7D
                                                                                                                                                                                          SHA1:7D06FC8F98140E0FFAA2571BD522FC772E58DE54
                                                                                                                                                                                          SHA-256:540EEECBA17207A56290BAFFDAE882BBD4F88364791204AD5D14C7BEDD022CCC
                                                                                                                                                                                          SHA-512:2B5BAD311A703A0FE2ED67ACE311BAD4C767BCD23DFC3D9ABDF5C3604146A6A15D6BD13A14BDEFCDB2B602C708AACFAB404E96FCBA7C546AD0DAECD4BE2EB34A
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# obsolete.tcl --..#..# This file contains obsolete procedures that people really shouldn't..# be using anymore, but which are kept around for backward compatibility...#..# Copyright (c) 1994 The Regents of the University of California...# Copyright (c) 1994 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# The procedures below are here strictly for backward compatibility with..# Tk version 3.6 and earlier. The procedures are no longer needed, so..# they are no-ops. You should not use these procedures anymore, since..# they may be removed in some future release.....proc tk_menuBar args {}..proc tk_bindForTraversal args {}....# ::tk::classic::restore --..#..# Restore the pre-8.5 (Tk classic) look as the widget defaults for classic..# Tk widgets...#..# The value following an 'option add' call is the new 8.5 value...#..namespace eval ::tk::classic {.. # This may need t
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1629
                                                                                                                                                                                          Entropy (8bit):4.784780799273752
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:g2hBuOrlkBytcqYXRE5fvvXq1EhJPqOj6Wf0cVlN:gQ6q4E5HCqhBqOhcaD
                                                                                                                                                                                          MD5:9B7A8FD2C6B538FF31BDC380452C6DE3
                                                                                                                                                                                          SHA1:3F915BFE85CED9F6C7E9A352718770E9F14F098E
                                                                                                                                                                                          SHA-256:40CA505C9784B0767D4854485C5C311829594A4FCBDFD7251E60E6BB7EA74FD1
                                                                                                                                                                                          SHA-512:43937152B844BE1E597E99DA1270E54AB1D572AE89CB759E6D41C18C9C8044CCC15A6925F9C5AF617AE9EC1404E78C2733231F4D5C6CFE4D23C546387B1FC328
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# optMenu.tcl --..#..# This file defines the procedure tk_optionMenu, which creates..# an option button and its associated menu...#..# Copyright (c) 1994 The Regents of the University of California...# Copyright (c) 1994 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# ::tk_optionMenu --..# This procedure creates an option button named $w and an associated..# menu. Together they provide the functionality of Motif option menus:..# they can be used to select one of many values, and the current value..# appears in the global variable varName, as well as in the text of..# the option menubutton. The name of the menu is returned as the..# procedure's result, so that the caller can use it to change configuration..# options on the menu or otherwise manipulate it...#..# Arguments:..# w -...The name to use for the menubutton...# varName -..Global variable to hold the currently
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8418
                                                                                                                                                                                          Entropy (8bit):4.964814946573677
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:HWh/x+hFMyTA/CTzxFoUuliRLDm8pQrQlENPyF3o48M6C:HWL+MyTA/CTzvAiRqyEw3ok
                                                                                                                                                                                          MD5:4CE08A10CD9AE941654B8C679DF669F3
                                                                                                                                                                                          SHA1:F1288BABCA698FD18C3BD221E6AE6C02F2975AAE
                                                                                                                                                                                          SHA-256:849B4C57E4644E51BEAEAEB3AE59B7FF067E582ECD10F1B2CAF6B6E72F11F506
                                                                                                                                                                                          SHA-512:0F37539DA3540E9B1DA7B0377E3BBB359B71DB4271D63BC9501E95931B4E609E8CB91DC2F7B08A6452598D4A0D58C6A2034049A215000EEF0F93A9963D003632
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# palette.tcl --..#..# This file contains procedures that change the color palette used..# by Tk...#..# Copyright (c) 1995-1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# ::tk_setPalette --..# Changes the default color scheme for a Tk application by setting..# default colors in the option database and by modifying all of the..# color options for existing widgets that have the default value...#..# Arguments:..# The arguments consist of either a single color name, which..# will be used as the new background color (all other colors will..# be computed from this) or an even number of values consisting of..# option names and values. The name for an option is the one used..# for the option database, such as activeForeground, not -activeforeground.....proc ::tk_setPalette {args} {.. if {[winfo depth .] == 1} {...# Just return on monochrome displays, otherwise errors
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):5370
                                                                                                                                                                                          Entropy (8bit):4.979530133775421
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:ssAXzkTQ9w5fLQYkJLZkRXKUXfwyZTq2sz8j2Em3YKhrYK:jAXgE0DQpJLGR6UXfpqnzG3m3YKhrYK
                                                                                                                                                                                          MD5:286C01A1B12261BC47F5659FD1627ABD
                                                                                                                                                                                          SHA1:4CA36795CAB6DFE0BBBA30BB88A2AB71A0896642
                                                                                                                                                                                          SHA-256:AA4F87E41AC8297F51150F2A9F787607690D01793456B93F0939C54D394731F9
                                                                                                                                                                                          SHA-512:D54D5A89B7408A9724A1CA1387F6473BDAD33885194B2EC5A524C7853A297FD65CE2A57F571C51DB718F6A00DCE845DE8CF5F51698F926E54ED72CDC81BCFE54
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# panedwindow.tcl --..#..# This file defines the default bindings for Tk panedwindow widgets and..# provides procedures that help in implementing those bindings.....bind Panedwindow <Button-1> { ::tk::panedwindow::MarkSash %W %x %y 1 }..bind Panedwindow <Button-2> { ::tk::panedwindow::MarkSash %W %x %y 0 }....bind Panedwindow <B1-Motion> { ::tk::panedwindow::DragSash %W %x %y 1 }..bind Panedwindow <B2-Motion> { ::tk::panedwindow::DragSash %W %x %y 0 }....bind Panedwindow <ButtonRelease-1> {::tk::panedwindow::ReleaseSash %W 1}..bind Panedwindow <ButtonRelease-2> {::tk::panedwindow::ReleaseSash %W 0}....bind Panedwindow <Motion> { ::tk::panedwindow::Motion %W %x %y }....bind Panedwindow <Leave> { ::tk::panedwindow::Leave %W }....# Initialize namespace..namespace eval ::tk::panedwindow {}....# ::tk::panedwindow::MarkSash --..#..# Handle marking the correct sash for possible dragging..#..# Arguments:..# w..the widget..# x..widget local x coord..# y..widget local y coord..# proxy.
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):376
                                                                                                                                                                                          Entropy (8bit):5.040809246948068
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:6:CsUgabAOgjDnzJNBc6ynID/cL4RpncleXN17MQ9PQqBIQ08hof7MQ9PQqBIQei:lGbyntNO6LYZliPBIUhkPBIFi
                                                                                                                                                                                          MD5:3367CE12A4BA9BAAF7C5127D7412AA6A
                                                                                                                                                                                          SHA1:865C775BB8F56C3C5DFC8C71BFAF9EF58386161D
                                                                                                                                                                                          SHA-256:3F2539E85E2A9017913E61FE2600B499315E1A6F249A4FF90E0B530A1EEB8898
                                                                                                                                                                                          SHA-512:F5D858F17FE358762E8FDBBF3D78108DBA49BE5C5ED84B964143C0ADCE76C140D904CD353646EC0831FF57CD0A0AF864D1833F3946A235725FFF7A45C96872EB
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:if {![package vsatisfies [package provide Tcl] 8.6.0]} return..if {($::tcl_platform(platform) eq "unix") && ([info exists ::env(DISPLAY)]...|| ([info exists ::argv] && ("-display" in $::argv)))} {.. package ifneeded Tk 8.6.12 [list load [file join $dir .. .. bin libtk8.6.dll]]..} else {.. package ifneeded Tk 8.6.12 [list load [file join $dir .. .. bin tk86t.dll]]..}..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:Tcl script, ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):7632
                                                                                                                                                                                          Entropy (8bit):4.891666209090638
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:Eet0t8bm9Z+Yjo+j/YKOtOUOtk8XKUal320:EetG8biZZs+bIAUoxX0d
                                                                                                                                                                                          MD5:21A3AC11146EC26784C0E729D8D644D0
                                                                                                                                                                                          SHA1:C7E0918E8692C42C1D1DD1BBCBFFF22A85979B69
                                                                                                                                                                                          SHA-256:579701605669AADFFBCDB7E3545C68442495428EE6E93C2D3A3133583BCD3D33
                                                                                                                                                                                          SHA-512:724ED83B989AD9033BEC4211EE50E4C9E85B51054C518CDF7E02D0ED0416F636B9F38C0B0D29F8F4F7F465B77C7D2E01D0918D2C2C3FEC4C7739EA982302FA2E
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# safetk.tcl --..#..# Support procs to use Tk in safe interpreters...#..# Copyright (c) 1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES.....# see safetk.n for documentation....#..#..# Note: It is now ok to let untrusted code being executed..# between the creation of the interp and the actual loading..# of Tk in that interp because the C side Tk_Init will..# now look up the parent interp and ask its safe::TkInit..# for the actual parameters to use for it's initialization (if allowed),..# not relying on the child state...#....# We use opt (optional arguments parsing)..package require opt 0.4.1;....namespace eval ::safe {.... # counter for safe toplevels.. variable tkSafeId 0..}....#..# tkInterpInit : prepare the child interpreter for tk loading..# most of the real job is done by loadTk..# returns the child name (tkInterpInit
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8056
                                                                                                                                                                                          Entropy (8bit):4.979589163397994
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:GSusE8YOdpO4aDtao+QYa6t2jooB6ajpaqa5xQz9MUKOC9dLrVx:KsbYQO48t+QYa+NkFjpaQz5KX9dLrVx
                                                                                                                                                                                          MD5:857ADD6060A986063B0ED594F6B0CD26
                                                                                                                                                                                          SHA1:B1981D33DDEA81CFFFA838E5AC80E592D9062E43
                                                                                                                                                                                          SHA-256:0DA2DC955FFD71062A21C3B747D9D59D66A5B09A907B9ED220BE1B2342205A05
                                                                                                                                                                                          SHA-512:7D9829565EFC8CDBF9249913DA95B02D8DADFDB3F455FD3C10C5952B5454FE6E54D95C07C94C1E0D7568C9742CAA56182B3656E234452AEC555F0FCB76A59FB1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# scale.tcl --..#..# This file defines the default bindings for Tk scale widgets and provides..# procedures that help in implementing the bindings...#..# Copyright (c) 1994 The Regents of the University of California...# Copyright (c) 1994-1995 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#-------------------------------------------------------------------------..# The code below creates the default class bindings for entries...#-------------------------------------------------------------------------....# Standard Motif bindings:....bind Scale <Enter> {.. if {$tk_strictMotif} {...set tk::Priv(activeBg) [%W cget -activebackground]...%W configure -activebackground [%W cget -background].. }.. tk::ScaleActivate %W %x %y..}..bind Scale <Motion> {.. tk::ScaleActivate %W %x %y..}..bind Scale <Leave> {.. if {$tk_strictMotif} {...%W configure -activebackground
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):13188
                                                                                                                                                                                          Entropy (8bit):5.063842571848725
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:Gf7RV8ei32PHKT8H2wwucyRlXn+kl1nBKp4nu5FCyK:2mei3qHKT8WPurnXn+I1nBg4nu5MyK
                                                                                                                                                                                          MD5:5249CD1E97E48E3D6DEC15E70B9D7792
                                                                                                                                                                                          SHA1:612E021BA25B5E512A0DFD48B6E77FC72894A6B9
                                                                                                                                                                                          SHA-256:EEC90404F702D3CFBFAEC0F13BF5ED1EBEB736BEE12D7E69770181A25401C61F
                                                                                                                                                                                          SHA-512:E4E0AB15EB9B3118C30CD2FF8E5AF87C549EAA9B640FFD809A928D96B4ADDEFB9D25EFDD1090FBD0019129CDF355BB2F277BC7194001BA1D2ED4A581110CEAFC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# scrlbar.tcl --..#..# This file defines the default bindings for Tk scrollbar widgets...# It also provides procedures that help in implementing the bindings...#..# Copyright (c) 1994 The Regents of the University of California...# Copyright (c) 1994-1996 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#-------------------------------------------------------------------------..# The code below creates the default class bindings for scrollbars...#-------------------------------------------------------------------------....# Standard Motif bindings:..if {[tk windowingsystem] eq "x11" || [tk windowingsystem] eq "aqua"} {....bind Scrollbar <Enter> {.. if {$tk_strictMotif} {...set tk::Priv(activeBg) [%W cget -activebackground]...%W configure -activebackground [%W cget -background].. }.. %W activate [%W identify %x %y]..}..bind Scrollbar <Motion> {.. %W activate [%
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):16526
                                                                                                                                                                                          Entropy (8bit):5.033807343600737
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:IMpfy/Ku9TzD0E8+9T1wqBaQKpiqQr7E32fnzXfWJU:IMpfy/Ku9Tx8WODTp2zPP
                                                                                                                                                                                          MD5:77DFE1BACCD165A0C7B35CDEAA2D1A8C
                                                                                                                                                                                          SHA1:426BA77FC568D4D3A6E928532E5BEB95388F36A0
                                                                                                                                                                                          SHA-256:2FF791A44406DC8339C7DA6116E6EC92289BEE5FC1367D378F48094F4ABEA277
                                                                                                                                                                                          SHA-512:E56DB85296C8661AB2EA0A56D9810F1A4631A9F9B41337560CBE38CCDF7DD590A3E65C22B435CE315EFF55EE5B8E49317D4E1B7577E25FC3619558015DD758EB
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# spinbox.tcl --..#..# This file defines the default bindings for Tk spinbox widgets and provides..# procedures that help in implementing those bindings. The spinbox builds..# off the entry widget, so it can reuse Entry bindings and procedures...#..# Copyright (c) 1992-1994 The Regents of the University of California...# Copyright (c) 1994-1997 Sun Microsystems, Inc...# Copyright (c) 1999-2000 Jeffrey Hobbs..# Copyright (c) 2000 Ajuba Solutions..#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#-------------------------------------------------------------------------..# Elements of tk::Priv that are used in this file:..#..# afterId -..If non-null, it means that auto-scanning is underway..#...and it gives the "after" id for the next auto-scan..#...command to be executed...# mouseMoved -..Non-zero means the mouse has moved a significant..#...amount since the button went down (so, for example,..#.
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):20523
                                                                                                                                                                                          Entropy (8bit):4.786929402401609
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:eeVL0UI9Ms++J7VT/hc+ISyNsATbOan/uW/UFQ1gs1gxtKZufe2SvdJcmq/YbhEB:eeF0UI9Ms++J7VT/hc+ISyCATbOan2W+
                                                                                                                                                                                          MD5:9378397DD3DCA9DFB181F6F512B15631
                                                                                                                                                                                          SHA1:4F95DD6B658B6A912725DC7D6226F8414020D6C7
                                                                                                                                                                                          SHA-256:B04B1A675572E6FCD12C5FE82C4FD0930395548436FF93D848BF340AE202E7E3
                                                                                                                                                                                          SHA-512:D28CC3C8F3D0B1B2371CBD9EE29AC6881BABD8A07C762FF8F3284449998EE44FA44752CC8AB0DE47A3492776CE1D13BC8EA18CFDBDF710639D2D62D02CB917A9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# Tcl autoload index file, version 2.0..# This file is generated by the "auto_mkindex" command..# and sourced to set up indexing information for one or..# more commands. Typically each line is a command that..# sets an element in the auto_index array, where the..# element name is the name of a command and the value is..# a script that loads the command.....set auto_index(::tk::dialog::error::Return) [list source [file join $dir bgerror.tcl]]..set auto_index(::tk::dialog::error::Details) [list source [file join $dir bgerror.tcl]]..set auto_index(::tk::dialog::error::SaveToLog) [list source [file join $dir bgerror.tcl]]..set auto_index(::tk::dialog::error::Destroy) [list source [file join $dir bgerror.tcl]]..set auto_index(::tk::dialog::error::bgerror) [list source [file join $dir bgerror.tcl]]..set auto_index(bgerror) [list source [file join $dir bgerror.tcl]]..set auto_index(::tk::ButtonInvoke) [list source [file join $dir button.tcl]]..set auto_index(::tk::ButtonAutoInvoke) [list sou
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):5309
                                                                                                                                                                                          Entropy (8bit):4.74935501162253
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:wfQXIqAv6iEwYtKVlPBnXWASbvMsDjXKpQQkK2tTsSZQ7Fowqm2K5r:wf+IqI6iU43PJYbvMsDjXKpsK2tISyZV
                                                                                                                                                                                          MD5:5F042DE8AD8941C7B9EF6D7BE06C86E4
                                                                                                                                                                                          SHA1:A4DFCEA2ACCAC2E85EAAA186DC765086D1E3AA3C
                                                                                                                                                                                          SHA-256:A4A8568633F827B54326640E6D1C3FDE4978EDC9E9FA1FB1D7B58F189DF1B1DC
                                                                                                                                                                                          SHA-512:E92A00028696A1557666CAB1C25AE6B63F25D75A9811BFAC56DFC069ECC769CC751B71CC81FA85C9CDE8F7FB6D7121EB64B58548CEE8AFE3F6C4A5C243507216
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# tearoff.tcl --..#..# This file contains procedures that implement tear-off menus...#..# Copyright (c) 1994 The Regents of the University of California...# Copyright (c) 1994-1997 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....# ::tk::TearoffMenu --..# Given the name of a menu, this procedure creates a torn-off menu..# that is identical to the given menu (including nested submenus)...# The new torn-off menu exists as a toplevel window managed by the..# window manager. The return value is the name of the new menu...# The window is created at the point specified by x and y..#..# Arguments:..# w -...The menu to be torn-off (duplicated)...# x -...x coordinate where window is created..# y -...y coordinate where window is created....proc ::tk::TearOffMenu {w {x 0} {y 0}} {.. # Find a unique name to use for the torn-off menu. Find the first.. # ancestor of w that is a
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):34961
                                                                                                                                                                                          Entropy (8bit):4.958000555615616
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:Rp4LaQDlJrqquMwIMyv4Et8avJLgmTGXs1bYMeNnnZl8n6KRD:R/K8aymTGs1b0xncn6KR
                                                                                                                                                                                          MD5:7C2AC370DE0B941AE13572152419C642
                                                                                                                                                                                          SHA1:7598CC20952FA590E32DA063BF5C0F46B0E89B15
                                                                                                                                                                                          SHA-256:4A42AD370E0CD93D4133B49788C0B0E1C7CD78383E88BACB51CB751E8BFDA15E
                                                                                                                                                                                          SHA-512:8325A33BFD99F0FCE4F14ED5DC6E03302F6FFABCE9D1ABFEFC24D16A09AB3439A4B753CBF06B28D8C95E4DDABFB9082C9B030619E8955A7E656BD6C61B9256C3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# text.tcl --..#..# This file defines the default bindings for Tk text widgets and provides..# procedures that help in implementing the bindings...#..# Copyright (c) 1992-1994 The Regents of the University of California...# Copyright (c) 1994-1997 Sun Microsystems, Inc...# Copyright (c) 1998 by Scriptics Corporation...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....#-------------------------------------------------------------------------..# Elements of ::tk::Priv that are used in this file:..#..# afterId -..If non-null, it means that auto-scanning is underway..#...and it gives the "after" id for the next auto-scan..#...command to be executed...# char -..Character position on the line; kept in order..#...to allow moving up or down past short lines while..#...still remembering the desired position...# mouseMoved -..Non-zero means the mouse has moved a significant..#...amount since the button we
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:Tcl script, ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):24266
                                                                                                                                                                                          Entropy (8bit):5.1375522500072925
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:Nuyxt+WaB9USY15gSgC3DbTbXLXKr3cIXyDAbK2LMGgtewT+3oFQRyH5bAy59Hmc:NuItNe9USZblXysm7GgteoFQRYMSySL
                                                                                                                                                                                          MD5:338184E46BD23E508DAEDBB11A4F0950
                                                                                                                                                                                          SHA1:437DB31D487C352472212E8791C8252A1412CB0E
                                                                                                                                                                                          SHA-256:0F617D96CBF213296D7A5F7FCFFBB4AE1149840D7D045211EF932E8DD66683E9
                                                                                                                                                                                          SHA-512:8FB8A353EECD0D19638943F0A9068DCCEBF3FB66D495EA845A99A89229D61A77C85B530F597FD214411202055C1FAA9229B6571C591C9F4630490E1EB30B9CD3
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# tk.tcl --..#..# Initialization script normally executed in the interpreter for each Tk-based..# application. Arranges class bindings for widgets...#..# Copyright (c) 1992-1994 The Regents of the University of California...# Copyright (c) 1994-1996 Sun Microsystems, Inc...# Copyright (c) 1998-2000 Ajuba Solutions...#..# See the file "license.terms" for information on usage and redistribution of..# this file, and for a DISCLAIMER OF ALL WARRANTIES.....# Verify that we have Tk binary and script components from the same release..package require -exact Tk 8.6.12.....# Create a ::tk namespace..namespace eval ::tk {.. # Set up the msgcat commands.. namespace eval msgcat {...namespace export mc mcmax.. if {[interp issafe] || [catch {package require msgcat}]} {.. # The msgcat package is not available. Supply our own.. # minimal replacement... proc mc {src args} {.. return [format $src {*}$args].. }.. proc mc
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):39613
                                                                                                                                                                                          Entropy (8bit):5.1830399016984146
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:+oj+AqE9cn9eJNgDN0/vsKulXgx65Eh6pSb:+6+ZM/gAEdix65Ehpb
                                                                                                                                                                                          MD5:47635811AAA1CEB26EDA3930D91C8855
                                                                                                                                                                                          SHA1:F071757BED525AF8CA21BFA0FCA89EC3F95AA278
                                                                                                                                                                                          SHA-256:595A0B05EB2CBD4CF489E57624B509FC3B4885E6410CA6416E7521D23694373D
                                                                                                                                                                                          SHA-512:A374126EC28E70C89EE247A591C2168DF55E110F260664F46F470C53CDA3A2411C3775391FC8FD575CEE69CD1768512E68CDDCB335204D00B9EB81906AC79344
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# tkfbox.tcl --..#..#.Implements the "TK" standard file selection dialog box. This dialog..#.box is used on the Unix platforms whenever the tk_strictMotif flag is..#.not set...#..#.The "TK" standard file selection dialog box is similar to the file..#.selection dialog box on Win95(TM). The user can navigate the..#.directories by clicking on the folder icons or by selecting the..#."Directory" option menu. The user can select files by clicking on the..#.file icons or by entering a filename in the "Filename:" entry...#..# Copyright (c) 1994-1998 Sun Microsystems, Inc...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....namespace eval ::tk::dialog {}..namespace eval ::tk::dialog::file {.. namespace import -force ::tk::msgcat::*.. variable showHiddenBtn 0.. variable showHiddenVar 1.... # Create the images if they did not already exist... if {![info exists ::tk::Priv(updirImage)]} {...s
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):3713
                                                                                                                                                                                          Entropy (8bit):4.915055696129498
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:InrWdo3L7Fe5qusQGdrMNnQbfIxEOxE0kFgG0FgGouox9FrGVuwg3kNcT+z5UlEr:UWdsOBn/1i+pqxwNjKs
                                                                                                                                                                                          MD5:01F28512E10ACBDDF93AE2BB29E343BC
                                                                                                                                                                                          SHA1:C9CF23D6315218B464061F011E4A9DC8516C8F1F
                                                                                                                                                                                          SHA-256:AE0437FB4E0EBD31322E4EACA626C12ABDE602DA483BB39D0C5EE1BC00AB0AF4
                                                                                                                                                                                          SHA-512:FE3BAE36DDB67F6D7A90B7A91B6EC1A009CF26C0167C46635E5A9CEAEC9083E59DDF74447BF6F60399657EE9604A2314B170F78A921CF948B2985DDF02A89DA6
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#..# Ttk widget set: Alternate theme..#....namespace eval ttk::theme::alt {.... variable colors.. array set colors {...-frame .."#d9d9d9"...-window.."#ffffff"...-darker ."#c3c3c3"...-border.."#414141"...-activebg ."#ececec"...-disabledfg."#a3a3a3"...-selectbg."#4a6984"...-selectfg."#ffffff"...-altindicator."#aaaaaa".. }.... ttk::style theme settings alt {.....ttk::style configure "." \... -background .$colors(-frame) \... -foreground .black \... -troughcolor.$colors(-darker) \... -bordercolor.$colors(-border) \... -selectbackground .$colors(-selectbg) \... -selectforeground .$colors(-selectfg) \... -font ..TkDefaultFont \... ;.....ttk::style map "." -background \... [list disabled $colors(-frame) active $colors(-activebg)] ;...ttk::style map "." -foreground [list disabled $colors(-disabledfg)] ;.. ttk::style map "." -embossed [list disabled 1] ;.....ttk::style configure TButton \... -anchor center -width -11 -padding "1 1" \... -reli
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):3838
                                                                                                                                                                                          Entropy (8bit):4.940737732832436
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:WdbclJFvlyLi+8OWXgQahpvAdNutdHrFBlCFBK2tdHkFBlhKgY1geAWUWeFVvtdp:C8EQPNeWgFeqdXj
                                                                                                                                                                                          MD5:F07A3A86362E9E253BE91F59714FE134
                                                                                                                                                                                          SHA1:84DE1AB2EAE62E4B114F0E613BD94955AFA9E6C7
                                                                                                                                                                                          SHA-256:E199CC9C429B35A09721D0A22543C3729E2B8462E68DFA158C0CEC9C70A0D79D
                                                                                                                                                                                          SHA-512:324EAF9F857076CA4FECB26D8DF76F8BB1D3F15EAE55D6B6C9689BF1682B306AC7A3592B6A518D23F9FE4DC21EFB6ACF1ECA948F889FA1ADFFA0E12C0BEAB57F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#..# Aqua theme (OSX native look and feel)..#....namespace eval ttk::theme::aqua {.. ttk::style theme settings aqua {.....ttk::style configure . \... -font TkDefaultFont \... -background systemWindowBackgroundColor \... -foreground systemLabelColor \... -selectbackground systemSelectedTextBackgroundColor \... -selectforeground systemSelectedTextColor \... -selectborderwidth 0 \... -insertwidth 1.....ttk::style map . \... -foreground {....disabled systemDisabledControlTextColor....background systemLabelColor} \... -selectbackground {....background systemSelectedTextBackgroundColor....!focus systemSelectedTextBackgroundColor} \... -selectforeground {....background systemSelectedTextColor....!focus systemSelectedTextColor}.....# Button...ttk::style configure TButton -anchor center -width -6 \... -foreground systemControlTextColor...ttk::style map TButton \... -foreground {....pressed white... {alternate !pressed !background} white}...ttk::styl
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):3014
                                                                                                                                                                                          Entropy (8bit):4.917794267131833
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:A5N+EqJWR1eTC01cG61ELLgrDgk1JgQ6TQGvhV5giT6TUP+3JWMHTeJ:kN+RQfccG61ooDgQ6dNT6TUP+PHO
                                                                                                                                                                                          MD5:D4BF1AF5DCDD85E3BD11DBF52EB2C146
                                                                                                                                                                                          SHA1:B1691578041319E671D31473A1DD404855D2038B
                                                                                                                                                                                          SHA-256:E38A9D1F437981AA6BF0BDD074D57B769A4140C0F7D9AFF51743FE4ECC6DFDDF
                                                                                                                                                                                          SHA-512:25834B4B231F4FF1A88EEF67E1A102D1D0546EC3B0D46856258A6BE6BBC4B381389C28E2EB60A01FF895DF24D6450CD16CA449C71F82BA53BA438A4867A47DCD
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#..# Bindings for Buttons, Checkbuttons, and Radiobuttons...#..# Notes: <Button1-Leave>, <Button1-Enter> only control the "pressed"..# state; widgets remain "active" if the pointer is dragged out...# This doesn't seem to be conventional, but it's a nice way..# to provide extra feedback while the grab is active...# (If the button is released off the widget, the grab deactivates and..# we get a <Leave> event then, which turns off the "active" state)..#..# Normally, <ButtonRelease> and <ButtonN-Enter/Leave> events are..# delivered to the widget which received the initial <Button>..# event. However, Tk [grab]s (#1223103) and menu interactions..# (#1222605) can interfere with this. To guard against spurious..# <Button1-Enter> events, the <Button1-Enter> binding only sets..# the pressed state if the button is currently active...#....namespace eval ttk::button {}....bind TButton <Enter> ..{ %W instate !disabled {%W state active} }..bind TButton <Leave>..{ %W state !active }..bind TButton <s
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):4809
                                                                                                                                                                                          Entropy (8bit):4.905115353394083
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:KrS4se/XhW03cC7TxPp/uo1ZUb0WZvSoetCgV+tMWG3xT3xgNB4x76FAuoxVYuIJ:oS4sSjWwFAGkhiP3xT3xL6B2bbe
                                                                                                                                                                                          MD5:2B20E7B2E6BDDBEB14F5F63BF38DBF24
                                                                                                                                                                                          SHA1:43DB48094C4BD7DE3B76AFBC051D887FEFE9887E
                                                                                                                                                                                          SHA-256:CFFC59931FDD1683AD23895E92522CF49B099128753FCDFF34374024E42CF995
                                                                                                                                                                                          SHA-512:1EB5EA78D26D18EAD6563AFBF1798F71723001DCC945E7DB3E4368564D0563029BE3565876AD8CB97331CFE34B2A0A313FA1BF252B87049160FE5DCD65434775
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#..# "Clam" theme...#..# Inspired by the XFCE family of Gnome themes...#....namespace eval ttk::theme::clam {.. variable colors.. array set colors {...-disabledfg.."#999999"...-frame .."#dcdad5"...-window .."#ffffff"...-dark..."#cfcdc8"...-darker .."#bab5ab"...-darkest.."#9e9a91"...-lighter.."#eeebe7"...-lightest .."#ffffff"...-selectbg.."#4a6984"...-selectfg.."#ffffff"...-altindicator.."#5895bc"...-disabledaltindicator."#a0a0a0".. }.... ttk::style theme settings clam {.....ttk::style configure "." \... -background $colors(-frame) \... -foreground black \... -bordercolor $colors(-darkest) \... -darkcolor $colors(-dark) \... -lightcolor $colors(-lighter) \... -troughcolor $colors(-darker) \... -selectbackground $colors(-selectbg) \... -selectforeground $colors(-selectfg) \... -selectborderwidth 0 \... -font TkDefaultFont \... ;.....ttk::style map "." \... -background [list disabled $colors(-frame) \..... active $colors(-lighter)] \..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):3864
                                                                                                                                                                                          Entropy (8bit):4.935603001745302
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:zcJZjdWs+WVB4ULsMF7tnvnuSuqo5DKxiFgG0FgGHx9FrGTtu/3Kt+iW2PbuAk38:zcJZEstB4UoituSm+VtYErY
                                                                                                                                                                                          MD5:0205663142775F4EF2EB104661D30979
                                                                                                                                                                                          SHA1:452A0D613288A1CC8A1181C3CC1167E02AA69A73
                                                                                                                                                                                          SHA-256:424BBA4FB6836FEEBE34F6C176ED666DCE51D2FBA9A8D7AA756ABCBBAD3FC1E3
                                                                                                                                                                                          SHA-512:FB4D212A73A6F5A8D2774F43D310328B029B52B35BEE133584D8326363B385AB7AA4AE25E98126324CC716962888321E0006E5F6EF8563919A1D719019B2D117
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#..# "classic" Tk theme...#..# Implements Tk's traditional Motif-like look and feel...#....namespace eval ttk::theme::classic {.... variable colors; array set colors {...-frame.."#d9d9d9"...-window.."#ffffff"...-activebg."#ececec"...-troughbg."#c3c3c3"...-selectbg."#c3c3c3"...-selectfg."#000000"...-disabledfg."#a3a3a3"...-indicator."#b03060"...-altindicator."#b05e5e".. }.... ttk::style theme settings classic {...ttk::style configure "." \... -font..TkDefaultFont \... -background..$colors(-frame) \... -foreground..black \... -selectbackground.$colors(-selectbg) \... -selectforeground.$colors(-selectfg) \... -troughcolor.$colors(-troughbg) \... -indicatorcolor.$colors(-frame) \... -highlightcolor.$colors(-frame) \... -highlightthickness.1 \... -selectborderwidth.1 \... -insertwidth.2 \... ;.....# To match pre-Xft X11 appearance, use:...#.ttk::style configure . -font {Helvetica 12 bold}.....ttk::style map "." -background \... [list disabled
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):12718
                                                                                                                                                                                          Entropy (8bit):5.063548300335668
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:otLzBJ9SfinaXUBLPYXlk7fKiLH+AzIoJdJwGknmyLsxoVEQGITse8g5sarkT32e:wB5aXmLPYXmrKxLL7A
                                                                                                                                                                                          MD5:F7065D345A4BFB3127C3689BF1947C30
                                                                                                                                                                                          SHA1:9631C05365B0F5A36E4CA5CBA83628CCD7FCBDE1
                                                                                                                                                                                          SHA-256:68EED4AF6D2EC5B3EA24B1122A704B040366CBE2F458103137479352FFA1475A
                                                                                                                                                                                          SHA-512:74B99B9E326680150DD5EC7263192691BCD8A71B2A4EE7F3177DEDDD43E924A7925085C6D372731A70570F96B3924450255B2F54CA3B9C44D1160CA37E715B00
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#..# Combobox bindings...#..# <<NOTE-WM-TRANSIENT>>:..#..#.Need to set [wm transient] just before mapping the popdown..#.instead of when it's created, in case a containing frame..#.has been reparented [#1818441]...#..#.On Windows: setting [wm transient] prevents the parent..#.toplevel from becoming inactive when the popdown is posted..#.(Tk 8.4.8+)..#..#.On X11: WM_TRANSIENT_FOR on override-redirect windows..#.may be used by compositing managers and by EWMH-aware..#.window managers (even though the older ICCCM spec says..#.it's meaningless)...#..#.On OSX: [wm transient] does utterly the wrong thing...#.Instead, we use [MacWindowStyle "help" "noActivates hideOnSuspend"]...#.The "noActivates" attribute prevents the parent toplevel..#.from deactivating when the popdown is posted, and is also..#.necessary for "help" windows to receive mouse events...#."hideOnSuspend" makes the popdown disappear (resp. reappear)..#.when the parent toplevel is deactivated (resp. reactivated)...#.(see [#18147
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):4827
                                                                                                                                                                                          Entropy (8bit):4.843146795750702
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:DRYEqfLDxGmxGUz4GUtaPT6t6brv0q3O4Uu0:DWEqTDbxdWaPqe5PUr
                                                                                                                                                                                          MD5:18EC3E60B8DD199697A41887BE6CE8C2
                                                                                                                                                                                          SHA1:13FF8CE95289B802A5247B1FD9DEA90D2875CB5D
                                                                                                                                                                                          SHA-256:7A2ED9D78FABCAFFF16694F2F4A2E36FF5AA313F912D6E93484F3BCD0466AD91
                                                                                                                                                                                          SHA-512:4848044442EFE75BCF1F89D8450C8ECBD441F38A83949A3CD2A56D9000CACAA2EA440CA1B32C856AB79358ACE9C7E3F70DDF0EC54AA93866223D8FEF76930B19
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#..# Map symbolic cursor names to platform-appropriate cursors...#..# The following cursors are defined:..#..#.standard.-- default cursor for most controls..#.""..-- inherit cursor from parent window..#.none..-- no cursor..#..#.text..-- editable widgets (entry, text)..#.link..-- hyperlinks within text..#.crosshair.-- graphic selection, fine control..#.busy..-- operation in progress..#.forbidden.-- action not allowed..#..#.hresize..-- horizontal resizing..#.vresize..-- vertical resizing..#..# Also resize cursors for each of the compass points,..# {nw,n,ne,w,e,sw,s,se}resize...#..# Platform notes:..#..# Windows doesn't distinguish resizing at the 8 compass points,..# only horizontal, vertical, and the two diagonals...#..# OSX doesn't have resize cursors for nw, ne, sw, or se corners...# We use the Tk-defined X11 fallbacks for these...#..# X11 doesn't have a "forbidden" cursor (usually a slashed circle);..# "pirate" seems to be the conventional cursor for this purpose...#..# Windows has a
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):4553
                                                                                                                                                                                          Entropy (8bit):4.933885986949396
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:lNl3u3lCFUeuMGN3xbVJU+N3xbVJh3IwxkxlBqatUrtY:zl3ZUe9GN3NVC+N3NVjqntUZY
                                                                                                                                                                                          MD5:FC79F42761D63172163C08F0F5C94436
                                                                                                                                                                                          SHA1:AABAB4061597D0D6DC371F46D14AAA1A859096DF
                                                                                                                                                                                          SHA-256:49AE8FAF169165BDDAF01D50B52943EBAB3656E9468292B7890BE143D0FCBC91
                                                                                                                                                                                          SHA-512:F619834A95C9DEB93F8184BCC437D701A961C77E24A831ADBD5C145556D26986BFDA2A6ACB9E8784F8B2380E122D12AC893EB1B6ACF03098922889497E1FF9EA
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#..# Settings for default theme...#....namespace eval ttk::theme::default {.. variable colors.. array set colors {...-frame..."#d9d9d9"...-foreground.."#000000"...-window..."#ffffff"...-text .."#000000"...-activebg.."#ececec"...-selectbg.."#4a6984"...-selectfg.."#ffffff"...-darker .."#c3c3c3"...-disabledfg.."#a3a3a3"...-indicator.."#4a6984"...-disabledindicator."#a3a3a3"...-altindicator.."#9fbdd8"...-disabledaltindicator."#c0c0c0".. }.... ttk::style theme settings default {.....ttk::style configure "." \... -borderwidth .1 \... -background .$colors(-frame) \... -foreground .$colors(-foreground) \... -troughcolor .$colors(-darker) \... -font ..TkDefaultFont \... -selectborderwidth.1 \... -selectbackground.$colors(-selectbg) \... -selectforeground.$colors(-selectfg) \... -insertwidth .1 \... -indicatordiameter.10 \... ;.....ttk::style map "." -background \... [list disabled $colors(-frame) active $colors(-activebg)]...ttk::style map "."
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):17617
                                                                                                                                                                                          Entropy (8bit):5.025882547402842
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:sca9JzOyzf6yzwO+v+iPT3vKof8q3YIuR13a:sT9JzOy76wiV3YNa
                                                                                                                                                                                          MD5:89089172393C551CD1668B9C19B88290
                                                                                                                                                                                          SHA1:0B8667217A4A14289E9F6C1B384DEF5479BCA089
                                                                                                                                                                                          SHA-256:830CC3009A735E92DB70D53210C4928DD35CAAB5051ED14DEC67E06AE25CBE28
                                                                                                                                                                                          SHA-512:ABBBE6AA937AAB392BC7DCB8BBFBBEC9EE5ED2C9F10ED982D77258BD98F27EE95AC47FD7CB6761B814885EF0878E1F1557D034C9F4163D9D85B388F2B837683F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#..# DERIVED FROM: tk/library/entry.tcl r1.22..#..# Copyright (c) 1992-1994 The Regents of the University of California...# Copyright (c) 1994-1997 Sun Microsystems, Inc...# Copyright (c) 2004, Joe English..#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#....namespace eval ttk {.. namespace eval entry {...variable State.....set State(x) 0...set State(selectMode) none...set State(anchor) 0...set State(scanX) 0...set State(scanIndex) 0...set State(scanMoved) 0.....# Button-2 scan speed is (scanNum/scanDen) characters...# per pixel of mouse movement....# The standard Tk entry widget uses the equivalent of...# scanNum = 10, scanDen = average character width....# I don't know why that was chosen....#...set State(scanNum) 1...set State(scanDen) 1...set State(deadband) 3.;# #pixels for mouse-moved deadband... }..}....### Option database settings...#..option add *TEntry.cursor [ttk::cursor text] widg
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):5732
                                                                                                                                                                                          Entropy (8bit):5.001928619185109
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:NzEh94ntnVU8Z/1LkAKgW22SeLMQR8hzcksejmOF4ytZm:Sh9ahV3ZWAKgWDfktm
                                                                                                                                                                                          MD5:80331FCBE4C049FF1A0D0B879CB208DE
                                                                                                                                                                                          SHA1:4EB3EFDFE3731BD1AE9FD52CE32B1359241F13CF
                                                                                                                                                                                          SHA-256:B94C319E5A557A5665B1676D602B6495C0887C5BACF7FA5B776200112978BB7B
                                                                                                                                                                                          SHA-512:A4BD2D91801C121A880225F1F3D0C4E30BF127190CF375F6F7A49EB4239A35C49C44F453D6D3610DF0D6A7B3CB15F4E79BD9C129025CC496CEB856FCC4B6DE87
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#..# Font specifications...#..# This file, [source]d at initialization time, sets up the following..# symbolic fonts based on the current platform:..#..# TkDefaultFont.-- default for GUI items not otherwise specified..# TkTextFont.-- font for user text (entry, listbox, others)..# TkFixedFont.-- standard fixed width font..# TkHeadingFont.-- headings (column headings, etc)..# TkCaptionFont -- dialog captions (primary text in alert dialogs, etc.)..# TkTooltipFont.-- font to use for tooltip windows..# TkIconFont.-- font to use for icon captions..# TkMenuFont.-- used to use for menu items..#..# In Tk 8.5, some of these fonts may be provided by the TIP#145 implementation..# (On Windows and Mac OS X as of Oct 2007)...#..# +++ Platform notes:..#..# Windows:..#.The default system font changed from "MS Sans Serif" to "Tahoma"..# .in Windows XP/Windows 2000...#..#.MS documentation says to use "Tahoma 8" in Windows 2000/XP,..#.although many MS programs still use "MS Sans Serif 8"..#..#.Should use
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):6641
                                                                                                                                                                                          Entropy (8bit):4.923865616450888
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:toMcJQkmcE6fNuLyiCpYSmFSRwgppdT3kXdpK3dpKkNf2tOTjvAG:tRc6kFbcz2pyXz+zZ2y
                                                                                                                                                                                          MD5:4C8D90257D073F263B258F00B2A518C2
                                                                                                                                                                                          SHA1:7B58859E9B70FB37F53809CD3FFD7CF69AB310D8
                                                                                                                                                                                          SHA-256:972B13854D0E9B84DE338D6753F0F11F3A8534E7D0E51838796DAE5A1E2E3085
                                                                                                                                                                                          SHA-512:ED67F41578EE834EE8DB1FDED8AA069C0045E7058E338C451FA8E1ADE52907BED0C95631C21B8E88461571903B3DA2698A29E47F990B7A0F0DD3073E7A1BCADC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#..# Bindings for Menubuttons...#..# Menubuttons have three interaction modes:..#..# Pulldown: Press menubutton, drag over menu, release to activate menu entry..# Popdown: Click menubutton to post menu..# Keyboard: <space> or accelerator key to post menu..#..# (In addition, when menu system is active, "dropdown" -- menu posts..# on mouse-over. Ttk menubuttons don't implement this)...#..# For keyboard and popdown mode, we hand off to tk_popup and let..# the built-in Tk bindings handle the rest of the interaction...#..# ON X11:..#..# Standard Tk menubuttons use a global grab on the menubutton...# This won't work for Ttk menubuttons in pulldown mode,..# since we need to process the final <ButtonRelease> event,..# and this might be delivered to the menu. So instead we..# rely on the passive grab that occurs on <Button> events,..# and transition to popdown mode when the mouse is released..# or dragged outside the menubutton...#..# ON WINDOWS:..#..# I'm not sure what the hell is going on h
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):5825
                                                                                                                                                                                          Entropy (8bit):4.96378772387536
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:RErUhyi5JeUQBWdz6eP8ClR6/u6AsBmPNNiREUkheLY1EVL23sN2JJjQdD:6uyiyDQBP8q6/u6AUREUsNEVq3y2jkdD
                                                                                                                                                                                          MD5:F811F3E46A4EFA73292F40D1CDDD265D
                                                                                                                                                                                          SHA1:7FC70A1984555672653A0840499954B854F27920
                                                                                                                                                                                          SHA-256:22264D8D138E2C0E9A950305B4F08557C5A73F054F8215C0D8CE03854042BE76
                                                                                                                                                                                          SHA-512:4424B7C687EB9B1804ED3B1C685F19D4D349753B374D9046240F937785C9713E8A760ADA46CB628C15F9C7983CE4A7987691C968330478C9C1A9B74E953E40AC
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#..# Bindings for TNotebook widget..#....namespace eval ttk::notebook {.. variable TLNotebooks ;# See enableTraversal..}....bind TNotebook <Button-1>..{ ttk::notebook::Press %W %x %y }..bind TNotebook <Right>...{ ttk::notebook::CycleTab %W 1; break }..bind TNotebook <Left>...{ ttk::notebook::CycleTab %W -1; break }..bind TNotebook <Control-Tab>..{ ttk::notebook::CycleTab %W 1; break }..bind TNotebook <Control-Shift-Tab>.{ ttk::notebook::CycleTab %W -1; break }..catch {..bind TNotebook <Control-ISO_Left_Tab>.{ ttk::notebook::CycleTab %W -1; break }..}..bind TNotebook <Destroy>..{ ttk::notebook::Cleanup %W }....# ActivateTab $nb $tab --..#.Select the specified tab and set focus...#..# Desired behavior:..#.+ take focus when reselecting the currently-selected tab;..#.+ keep focus if the notebook already has it;..#.+ otherwise set focus to the first traversable widget..#. in the newly-selected tab;..#.+ do not leave the focus in a deselected tab...#..proc ttk::notebook::ActivateTab {
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2290
                                                                                                                                                                                          Entropy (8bit):4.948496148661722
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:zVAqE3ZF8b4rXzsqALAXsmCLFeNqkFeNXLz:zLeU4bzNs1h
                                                                                                                                                                                          MD5:619D8F54EE73AD8A373AB272FBDB94A6
                                                                                                                                                                                          SHA1:973626B5396B7E786DEDD8159D10E66B4465F9E0
                                                                                                                                                                                          SHA-256:4D08A7E29EEF731876951EF01DFA51654B6275FA3DAADB1F48FF4BBEAC238EB5
                                                                                                                                                                                          SHA-512:0D913C7DC9DAEE2B4A2A46663A07B3139D6B8F30D2F942642817504535E85616835EAA7D468851A83723A3DD711B65761376F3DF96A59A933A74EF096E13ACE9
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#..# Bindings for ttk::panedwindow widget...#....namespace eval ttk::panedwindow {.. variable State.. array set State {...pressed 0.. .pressX.-...pressY.-...sash .-...sashPos -.. }..}....## Bindings:..#..bind TPanedwindow <Button-1> ..{ ttk::panedwindow::Press %W %x %y }..bind TPanedwindow <B1-Motion>..{ ttk::panedwindow::Drag %W %x %y }..bind TPanedwindow <ButtonRelease-1> .{ ttk::panedwindow::Release %W %x %y }....bind TPanedwindow <Motion> ..{ ttk::panedwindow::SetCursor %W %x %y }..bind TPanedwindow <Enter> ..{ ttk::panedwindow::SetCursor %W %x %y }..bind TPanedwindow <Leave> ..{ ttk::panedwindow::ResetCursor %W }..# See <<NOTE-PW-LEAVE-NOTIFYINFERIOR>>..bind TPanedwindow <<EnteredChild>>.{ ttk::panedwindow::ResetCursor %W }....## Sash movement:..#..proc ttk::panedwindow::Press {w x y} {.. variable State.... set sash [$w identify $x $y].. if {$sash eq ""} {.. .set State(pressed) 0...return.. }.. set State(pressed) .1.. set State(pressX) .$x.. set
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1138
                                                                                                                                                                                          Entropy (8bit):4.763501917862434
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24:nJ8v3O0NSiio0pNFVkIks0ImxlnINgDImSgGINSyWghT:JFqS/o03fkxs0Rn+gD4v+S2F
                                                                                                                                                                                          MD5:DBF3BF0E8F04E9435E9561F740DFC700
                                                                                                                                                                                          SHA1:C7619A05A834EFB901C57DCFEC2C9E625F42428F
                                                                                                                                                                                          SHA-256:697CC0A75AE31FE9C2D85FB25DCA0AFA5D0DF9C523A2DFAD2E4A36893BE75FBA
                                                                                                                                                                                          SHA-512:D3B323DFB3EAC4A78DA2381405925C131A99C6806AF6FD8041102162A44E48BF166982A4AE4AA142A14601736716F1A628D9587E292FA8E4842BE984374CC192
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#..# Ttk widget set: progress bar utilities...#....namespace eval ttk::progressbar {.. variable Timers.;# Map: widget name -> after ID..}....# Autoincrement --..#.Periodic callback procedure for autoincrement mode..#..proc ttk::progressbar::Autoincrement {pb steptime stepsize} {.. variable Timers.... if {![winfo exists $pb]} {.. .# widget has been destroyed -- cancel timer...unset -nocomplain Timers($pb)...return.. }.... set Timers($pb) [after $steptime \.. .[list ttk::progressbar::Autoincrement $pb $steptime $stepsize] ].... $pb step $stepsize..}....# ttk::progressbar::start --..#.Start autoincrement mode. Invoked by [$pb start] widget code...#..proc ttk::progressbar::start {pb {steptime 50} {stepsize 1}} {.. variable Timers.. if {![info exists Timers($pb)]} {...Autoincrement $pb $steptime $stepsize.. }..}....# ttk::progressbar::stop --..#.Cancel autoincrement mode. Invoked by [$pb stop] widget code...#..proc ttk::progressbar::stop {pb} {.. variabl
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2787
                                                                                                                                                                                          Entropy (8bit):4.795451191784129
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:IKADAzizZIcAlRqucObmn4AzyVN2AJyhAzukPNP:IHIBRqupmLSZkklP
                                                                                                                                                                                          MD5:F1C33CC2D47115BBECD2E7C2FCB631A7
                                                                                                                                                                                          SHA1:0123A961242ED8049B37C77C726DB8DBD94C1023
                                                                                                                                                                                          SHA-256:B909ADD0B87FA8EE08FD731041907212A8A0939D37D2FF9B2F600CD67DABD4BB
                                                                                                                                                                                          SHA-512:96587A8C3555DA1D810010C10C516CE5CCAB071557A3C8D9BD65C647C7D4AD0E35CBED0788F1D72BAFAC8C84C7E2703FC747F70D9C95F720745A1FC4A701C544
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# scale.tcl - Copyright (C) 2004 Pat Thoyts <patthoyts@users.sourceforge.net>..#..# Bindings for the TScale widget....namespace eval ttk::scale {.. variable State.. array set State {...dragging 0.. }..}....bind TScale <Button-1> { ttk::scale::Press %W %x %y }..bind TScale <B1-Motion> { ttk::scale::Drag %W %x %y }..bind TScale <ButtonRelease-1> { ttk::scale::Release %W %x %y }....bind TScale <Button-2> { ttk::scale::Jump %W %x %y }..bind TScale <B2-Motion> { ttk::scale::Drag %W %x %y }..bind TScale <ButtonRelease-2> { ttk::scale::Release %W %x %y }....bind TScale <Button-3> { ttk::scale::Jump %W %x %y }..bind TScale <B3-Motion> { ttk::scale::Drag %W %x %y }..bind TScale <ButtonRelease-3> { ttk::scale::Release %W %x %y }....## Keyboard navigation bindings:..#..bind TScale <<LineStart>> { %W set [%W cget -from] }..bind TScale <<LineEnd>> { %W set [%W cget -to] }....bind TScale <<PrevChar>> { ttk::scale::Increment %W -1 }..bin
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):3285
                                                                                                                                                                                          Entropy (8bit):4.979174619784594
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:tyASEji8RYQ8FGD7BDos9Q1TBfvq/HKTh9lkHv8T/mAezeLEAAFULxZh4x:eIi8qFu2d11XlhfkPcczeLS4Zm
                                                                                                                                                                                          MD5:3FB31A225CEC64B720B8E579582F2749
                                                                                                                                                                                          SHA1:9C0151D9E2543C217CF8699FF5D4299A72E8F13C
                                                                                                                                                                                          SHA-256:6EAA336B13815A7FC18BCD6B9ADF722E794DA2888D053C229044784C8C8E9DE8
                                                                                                                                                                                          SHA-512:E6865655585E3D2D6839B56811F3FD86B454E8CD44E258BB1AC576AD245FF8A4D49FBB7F43458BA8A6C9DAAC8DFA923A176F0DD8A9976A11BEA09E6E2D17BF45
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#..# Bindings for TScrollbar widget..#....namespace eval ttk::scrollbar {.. variable State.. # State(xPress).--.. # State(yPress).-- initial position of mouse at start of drag... # State(first).-- value of -first at start of drag...}....bind TScrollbar <Button-1> ..{ ttk::scrollbar::Press %W %x %y }..bind TScrollbar <B1-Motion>..{ ttk::scrollbar::Drag %W %x %y }..bind TScrollbar <ButtonRelease-1>.{ ttk::scrollbar::Release %W %x %y }....bind TScrollbar <Button-2> ..{ ttk::scrollbar::Jump %W %x %y }..bind TScrollbar <B2-Motion>..{ ttk::scrollbar::Drag %W %x %y }..bind TScrollbar <ButtonRelease-2>.{ ttk::scrollbar::Release %W %x %y }....# Redirect scrollwheel bindings to the scrollbar widget..#..# The shift-bindings scroll left/right (not up/down)..# if a widget has both possibilities..set eventList [list <MouseWheel> <Shift-MouseWheel>]..switch [tk windowingsystem] {.. aqua {.. lappend eventList <Option-MouseWheel> <Shift-Option-MouseWheel>.. }.. x11 {..
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2503
                                                                                                                                                                                          Entropy (8bit):4.830288003879418
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:naLvMnAqeYQWYh7FvBrrbnMCfY/aVAbAigWAuFM0PfWAX20:nWQapprPnJY/8A8iRFdPtj
                                                                                                                                                                                          MD5:DD6A1737B14D3F7B2A0B4F8BE99C30AF
                                                                                                                                                                                          SHA1:E6B06895317E73CD3DC78234DD74C74F3DB8C105
                                                                                                                                                                                          SHA-256:E92D77B5CDCA2206376DB2129E87E3D744B3D5E31FDE6C0BBD44A494A6845CE1
                                                                                                                                                                                          SHA-512:B74AE92EDD53652F8A3DB0D84C18F9CE9069805BCAB0D3C2DBB537D7C241AA2681DA69B699D88A10029798D7B5BC015682F64699BA475AE6A379EEF23B48DAAF
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#..# Sizegrip widget bindings...#..# Dragging a sizegrip widget resizes the containing toplevel...#..# NOTE: the sizegrip widget must be in the lower right hand corner...#....switch -- [tk windowingsystem] {.. x11 -.. win32 {...option add *TSizegrip.cursor [ttk::cursor seresize] widgetDefault.. }.. aqua {.. .# Aqua sizegrips use default Arrow cursor... }..}....namespace eval ttk::sizegrip {.. variable State.. array set State {...pressed .0...pressX ..0...pressY ..0...width ..0...height ..0...widthInc.1...heightInc.1.. resizeX 1.. resizeY 1...toplevel .{}.. }..}....bind TSizegrip <Button-1> ..{ ttk::sizegrip::Press.%W %X %Y }..bind TSizegrip <B1-Motion> ..{ ttk::sizegrip::Drag .%W %X %Y }..bind TSizegrip <ButtonRelease-1> .{ ttk::sizegrip::Release %W %X %Y }....proc ttk::sizegrip::Press {W X Y} {.. variable State.... if {[$W instate disabled]} { return }.... set top [winfo toplevel $W].... # If the toplevel is not resi
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):5003
                                                                                                                                                                                          Entropy (8bit):5.055050310142795
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:1qg/+yrjqA/K5ytxm1J1Ve6J1yQLUAzz/S76hrwxGGe2F:N/+yr2Gk1J1Ve6fxUAzDS76hrwxs2F
                                                                                                                                                                                          MD5:9C2833FAA9248F09BC2E6AB1BA326D59
                                                                                                                                                                                          SHA1:F13CF048FD706BBB1581DC80E33D1AAD910D93E8
                                                                                                                                                                                          SHA-256:DF286BB59F471AA1E19DF39AF0EF7AA84DF9F04DC4A439A747DD8BA43C300150
                                                                                                                                                                                          SHA-512:5FF3BE1E3D651C145950C3FC5B8C2E842211C937D1042173964383D4D59ECF5DD0EC39FF7771D029716F2D895F0B1A72591EF3BF7947FE64D4D6DB5F0B8ABFFB
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#..# ttk::spinbox bindings..#....namespace eval ttk::spinbox { }....### Spinbox bindings...#..# Duplicate the Entry bindings, override if needed:..#....ttk::copyBindings TEntry TSpinbox....bind TSpinbox <Motion>...{ ttk::spinbox::Motion %W %x %y }..bind TSpinbox <Button-1> ..{ ttk::spinbox::Press %W %x %y }..bind TSpinbox <ButtonRelease-1> .{ ttk::spinbox::Release %W }..bind TSpinbox <Double-Button-1> .{ ttk::spinbox::DoubleClick %W %x %y }..bind TSpinbox <Triple-Button-1> .{} ;# disable TEntry triple-click....bind TSpinbox <Up>...{ event generate %W <<Increment>> }..bind TSpinbox <Down> ...{ event generate %W <<Decrement>> }....bind TSpinbox <<Increment>>..{ ttk::spinbox::Spin %W +1 }..bind TSpinbox <<Decrement>> ..{ ttk::spinbox::Spin %W -1 }....ttk::bindMouseWheel TSpinbox ..[list ttk::spinbox::MouseWheel %W]....## Motion --..#.Sets cursor...#..proc ttk::spinbox::Motion {w x y} {.. variable State.. ttk::saveCursor $w State(userConfCursor) [ttk::cursor text].. if { [$w ide
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):10180
                                                                                                                                                                                          Entropy (8bit):4.886259798213254
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:FoTvMxHZZ1u2xj7+ZBHxjiXJv9IfwW+vr3UxjXEJDTF/MyLF3JcMzlsra2tYGa5P:mImAkRKYXMH59o4UbS30LWb
                                                                                                                                                                                          MD5:F705B3A292D02061DA0ABB4A8DD24077
                                                                                                                                                                                          SHA1:FD75C2250F6F66435444F7DEEF383C6397ED2368
                                                                                                                                                                                          SHA-256:C88B60FFB0F72E095F6FC9786930ADD7F9ED049EABC713F889F9A7DA516E188C
                                                                                                                                                                                          SHA-512:09817638DD3D3D5C57FA630C7EDF2F19C3956C9BD264DBF07627FA14A03AECD22D5A5319806E49EF1030204FADEF17C57CE8EAE4378A319AD2093321D9151C8F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#..# ttk::treeview widget bindings and utilities...#....namespace eval ttk::treeview {.. variable State.... # Enter/Leave/Motion.. #.. set State(activeWidget) .{}.. set State(activeHeading) .{}.... # Press/drag/release:.. #.. set State(pressMode) .none.. set State(pressX)..0.... # For pressMode == "resize".. set State(resizeColumn).#0.... # For pressmode == "heading".. set State(heading) .{}..}....### Widget bindings...#....bind Treeview.<Motion> ..{ ttk::treeview::Motion %W %x %y }..bind Treeview.<B1-Leave>..{ #nothing }..bind Treeview.<Leave>...{ ttk::treeview::ActivateHeading {} {}}..bind Treeview.<Button-1> ..{ ttk::treeview::Press %W %x %y }..bind Treeview.<Double-Button-1> .{ ttk::treeview::DoubleClick %W %x %y }..bind Treeview.<ButtonRelease-1> .{ ttk::treeview::Release %W %x %y }..bind Treeview.<B1-Motion> ..{ ttk::treeview::Drag %W %x %y }..bind Treeview .<Up> ..{ ttk::treeview::Keynav %W up }..bind Treeview .<Down> ..{ ttk::treeview
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):4993
                                                                                                                                                                                          Entropy (8bit):4.954034141173847
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:96:lfxukTy5jPTq8LIgF2diyNTNR6nkrn4ijSSvNigyJ5612HtZG835MSvWOTRsHWU:BM+y5jrq8G/2nkEijSSvNigyJ5612Htw
                                                                                                                                                                                          MD5:AF45B2C8B43596D1BDECA5233126BD14
                                                                                                                                                                                          SHA1:A99E75D299C4579E10FCDD59389B98C662281A26
                                                                                                                                                                                          SHA-256:2C48343B1A47F472D1A6B9EE8D670CE7FB428DB0DB7244DC323FF4C7A8B4F64B
                                                                                                                                                                                          SHA-512:C8A8D01C61774321778AB149F6CA8DDA68DB69133CB5BA7C91938E4FD564160ECDCEC473222AFFB241304A9ACC73A36B134B3A602FD3587C711F2ADBB64AFA80
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#..# Ttk widget set initialization script...#....### Source library scripts...#....namespace eval ::ttk {.. variable library.. if {![info exists library]} {...set library [file dirname [info script]].. }..}....source -encoding utf-8 [file join $::ttk::library fonts.tcl]..source -encoding utf-8 [file join $::ttk::library cursors.tcl]..source -encoding utf-8 [file join $::ttk::library utils.tcl]....## ttk::deprecated $old $new --..#.Define $old command as a deprecated alias for $new command..#.$old and $new must be fully namespace-qualified...#..proc ttk::deprecated {old new} {.. interp alias {} $old {} ttk::do'deprecate $old $new..}..## do'deprecate --..#.Implementation procedure for deprecated commands --..#.issue a warning (once), then re-alias old to new...#..proc ttk::do'deprecate {old new args} {.. deprecated'warning $old $new.. interp alias {} $old {} $new.. uplevel 1 [linsert $args 0 $new]..}....## deprecated'warning --..#.Gripe about use of deprecated comman
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):8624
                                                                                                                                                                                          Entropy (8bit):5.001791071900077
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:e0ebpSp+IZwnmTmpx8xzaHfw8K7LVJWQl8p7M+R5:rw0+WmpWxa/w9nVJHu
                                                                                                                                                                                          MD5:D98EDC491DA631510F124CD3934F535F
                                                                                                                                                                                          SHA1:33037A966067C9F5C9074AE5532FF3B51B4082D4
                                                                                                                                                                                          SHA-256:D58610A34301BB6E61A60BEC69A7CECF4C45C6A034A9FC123977174B586278BE
                                                                                                                                                                                          SHA-512:23FAED8298E561F490997FE44AB61CD8CCB9F1F63D48BB4CF51FC9E591E463FF9297973622180D6A599CABB541C82B8FE33BF38A82C5D5905BBFA52CA0341399
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#..# Utilities for widget implementations...#....### Focus management...#..# See also: #1516479..#....## ttk::takefocus --..#.This is the default value of the "-takefocus" option..#.for ttk::* widgets that participate in keyboard navigation...#..# NOTES:..#.tk::FocusOK (called by tk_focusNext) tests [winfo viewable]..#.if -takefocus is 1, empty, or missing; but not if it's a..#.script prefix, so we have to check that here as well...#..#..proc ttk::takefocus {w} {.. expr {[$w instate !disabled] && [winfo viewable $w]}..}....## ttk::GuessTakeFocus --..#.This routine is called as a fallback for widgets..#.with a missing or empty -takefocus option...#..#.It implements the same heuristics as tk::FocusOK...#..proc ttk::GuessTakeFocus {w} {.. # Don't traverse to widgets with '-state disabled':.. #.. if {![catch {$w cget -state} state] && $state eq "disabled"} {...return 0.. }.... # Allow traversal to widgets with explicit key or focus bindings:.. #.. if {[regexp {Key|F
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):9710
                                                                                                                                                                                          Entropy (8bit):4.6639701588183895
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:BktY1F+qXd95WSZaHFHRE3GRKFh2oaoT/ezKpqvYMHab:V1F+cd95WSZuhRE34KbPmKmY2ab
                                                                                                                                                                                          MD5:0AA7F8B43C3E07F3A4DA07FC6DF9A1B0
                                                                                                                                                                                          SHA1:153AFB735B10BBA16CFBE161777232F983845D90
                                                                                                                                                                                          SHA-256:EC5F203C69DF390E9B99944CF3526D6E77DC6F68E9B1A029F326A41AFED1EF81
                                                                                                                                                                                          SHA-512:5406553211CD6714C98EF7765ABD46424CCB013343EFF693FDD3AE6E0AAE9B5983446E0E1CC706D6B2C285084BF83D397306D3D52028CBBCFB8F369857C5B69C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#..# Settings for Microsoft Windows Vista and Server 2008..#....# The Vista theme can only be defined on Windows Vista and above. The theme..# is created in C due to the need to assign a theme-enabled function for..# detecting when themeing is disabled. On systems that cannot support the..# Vista theme, there will be no such theme created and we must not..# evaluate this script.....if {"vista" ni [ttk::style theme names]} {.. return..}....namespace eval ttk::theme::vista {.... ttk::style theme settings vista {.... .ttk::style configure . \... -background SystemButtonFace \... -foreground SystemWindowText \... -selectforeground SystemHighlightText \... -selectbackground SystemHighlight \... -insertcolor SystemWindowText \... -font TkDefaultFont \... ;.....ttk::style map "." \... -foreground [list disabled SystemGrayText] \... ;.....ttk::style configure TButton -anchor center -padding {1 1} -width -11...ttk::style configure TRadiobutton -padding 2...ttk::
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2865
                                                                                                                                                                                          Entropy (8bit):4.917847108902527
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:b69VhW2gL5FPVWRzQsVqrEuF3yYrf7rfJF8xUqBgLt6g3ktO5jo4+iZ6O2htYtCW:bbXl+CEqZNNSxU0Ht2MR7W
                                                                                                                                                                                          MD5:769C0719A4044F91E7D132A25291E473
                                                                                                                                                                                          SHA1:6FB07B0C887D443A43FB15D5728920B578171219
                                                                                                                                                                                          SHA-256:AE82BCCCE708FF9C303CBCB3D4CC3FF5577A60D5B23822EA79E3E07CCE3CBBD1
                                                                                                                                                                                          SHA-512:47FED061DDC6B4EB63EF77901D0094FF2EBB1BAFACB3F44FBF13FB59DEA1EC83985B2862086ECF1A7957819A88A0FAA144B35F16BEA9356BBD9775070D42E636
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#..# Settings for 'winnative' theme...#....namespace eval ttk::theme::winnative {.. ttk::style theme settings winnative {.....ttk::style configure "." \... -background SystemButtonFace \... -foreground SystemWindowText \... -selectforeground SystemHighlightText \... -selectbackground SystemHighlight \... -fieldbackground SystemWindow \... -insertcolor SystemWindowText \... -troughcolor SystemScrollbar \... -font TkDefaultFont \... ;.....ttk::style map "." -foreground [list disabled SystemGrayText] ;.. ttk::style map "." -embossed [list disabled 1] ;.....ttk::style configure TButton \... -anchor center -width -11 -relief raised -shiftrelief 1...ttk::style configure TCheckbutton -padding "2 4"...ttk::style configure TRadiobutton -padding "2 4"...ttk::style configure TMenubutton \... -padding "8 4" -arrowsize 3 -relief raised.....ttk::style map TButton -relief {{!disabled pressed} sunken}.....ttk::style configure TEntry \... -padding 2 -select
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):2103
                                                                                                                                                                                          Entropy (8bit):4.9805308941424355
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:48:aaiIu89VhW2gLRWJyO514rf+rfzxTrf/MW+iZ6O2htYtCp:XoXAk21nxQ7p
                                                                                                                                                                                          MD5:162F30D2716438C75EA16B57E6F63088
                                                                                                                                                                                          SHA1:3F626FF0496BB16B27106BED7E38D1C72D1E3E27
                                                                                                                                                                                          SHA-256:AEDB21C6B2909A4BB4686837D2126E521A8CC2B38414A4540387B801EBD75466
                                                                                                                                                                                          SHA-512:6EBF9648F1381D04F351BB469B6E3A38F3D002189C92EAF80A18D65632037FF37D34EC8814BBF7FAE34553645BFC13985212F24684EE8C4E205729B975C88C97
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:#..# Settings for 'xpnative' theme..#....namespace eval ttk::theme::xpnative {.... ttk::style theme settings xpnative {.....ttk::style configure . \... -background SystemButtonFace \... -foreground SystemWindowText \... -selectforeground SystemHighlightText \... -selectbackground SystemHighlight \... -insertcolor SystemWindowText \... -font TkDefaultFont \... ;.....ttk::style map "." \... -foreground [list disabled SystemGrayText] \... ;.....ttk::style configure TButton -anchor center -padding {1 1} -width -11...ttk::style configure TRadiobutton -padding 2...ttk::style configure TCheckbutton -padding 2...ttk::style configure TMenubutton -padding {8 4}.....ttk::style configure TNotebook -tabmargins {2 2 2 0}...ttk::style map TNotebook.Tab \... -expand [list selected {2 2 2 2}].....ttk::style configure TLabelframe.Label -foreground "#0046d5".....# OR: -padding {3 3 3 6}, which some apps seem to use....ttk::style configure TEntry -padding {2 2 2 4}...ttk::
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):10521
                                                                                                                                                                                          Entropy (8bit):5.0647027375963996
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:192:1Y3uWEXm/swEePmJhRAXd1hTHsHG2ML/9Lm2daM0Hu:8hodMiM0Hu
                                                                                                                                                                                          MD5:508F7E258C04970FAE526990168CB773
                                                                                                                                                                                          SHA1:33785204B18C0E0F5CDCB5B49399B5907351FDB8
                                                                                                                                                                                          SHA-256:B463B366F139DDF7FED31F34C6D2341F9F27845A1A358011DFC801E1333B1828
                                                                                                                                                                                          SHA-512:A12985B58DD1D46297119CED47B7F44EF4139CED6C36FD028E66DD657E5ED0663B744C679A5BF7A39B39D17A32E1280D2945F6B9AD59AEF20436F68040F6070C
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# unsupported.tcl --..#..# Commands provided by Tk without official support. Use them at your..# own risk. They may change or go away without notice...#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES.....# ----------------------------------------------------------------------..# Unsupported compatibility interface for folks accessing Tk's private..# commands and variable against recommended usage...# ----------------------------------------------------------------------....namespace eval ::tk::unsupported {.... # Map from the old global names of Tk private commands to their.. # new namespace-encapsulated names..... variable PrivateCommands.. array set PrivateCommands {...tkButtonAutoInvoke..::tk::ButtonAutoInvoke...tkButtonDown...::tk::ButtonDown...tkButtonEnter...::tk::ButtonEnter...tkButtonInvoke...::tk::ButtonInvoke...tkButtonLeave...::tk::ButtonLeave...tkButtonUp...::tk::ButtonUp...tk
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):27064
                                                                                                                                                                                          Entropy (8bit):4.967626999005091
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:384:0BLzjXhss64XP8FXm39QJ63nwFiHLgRIdNPCRE5phLtffsNP4XWdxWk+I5oy9jN7:0BvjXoivB3flLCRE5phLCP3xWV8veTod
                                                                                                                                                                                          MD5:6DFD12DB27069F13957BC963EF5ACAAF
                                                                                                                                                                                          SHA1:E492F0B60D73CE17C4FA7680BF0087DC5E0CC132
                                                                                                                                                                                          SHA-256:1ED57E32CE9C419BCE36B483A91410DDF4C997CAF62D20E42048FC350F8C3F60
                                                                                                                                                                                          SHA-512:32A3E205B4BC3B7D4D6F31E6FD26075EA3FAB7396F7392855D8BD4426CFEE9081482759EFF219038D64B074E2D3D864041E7C37DCA134F2A0C3140AA04D757C2
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:# xmfbox.tcl --..#..#.Implements the "Motif" style file selection dialog for the..#.Unix platform. This implementation is used only if the..#."::tk_strictMotif" flag is set...#..# Copyright (c) 1996 Sun Microsystems, Inc...# Copyright (c) 1998-2000 Scriptics Corporation..#..# See the file "license.terms" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES.....namespace eval ::tk::dialog {}..namespace eval ::tk::dialog::file {}......# ::tk::MotifFDialog --..#..#.Implements a file dialog similar to the standard Motif file..#.selection box...#..# Arguments:..#.type.."open" or "save"..#.args..Options parsed by the procedure...#..# Results:..#.When -multiple is set to 0, this returns the absolute pathname..#.of the selected file. (NOTE: This is not the same as a single..#.element list.)..#..#.When -multiple is set to > 0, this returns a Tcl list of absolute..# pathnames. The argument for -multiple is ignored, but for consistency..#
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1011592
                                                                                                                                                                                          Entropy (8bit):6.662599822806773
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:24576:xkmZDEMHhp9v1Ikbn3ND0TNVOsIut8P4zmxvSZX0yplkH:6mZFHhp9v1Io3h0TN3pvkH
                                                                                                                                                                                          MD5:7B809AB173D42EEAC1173B8DA32F885F
                                                                                                                                                                                          SHA1:FA6F239BBD881676804F994BB756E9319545B3F7
                                                                                                                                                                                          SHA-256:108FD8EF417E441C3F4AD978F48F93053CAE4A719FDE055D65F482AAA2D1B978
                                                                                                                                                                                          SHA-512:A20604ECC02FF622338AD6B81F683F7E483DB72D2C7C26FB64BA9D6F5F8ECF6961AEA443BE31F58EB7843300AEBA2F82BE871157A74D894A48AC81581A4AA2B1
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........W..l9F.l9F.l9F...F.l9F.l8F.l9F...F.l9F..9G.l9F..:G.l9F..<G.l9F..7G.n9F..=G.l9F...F.l9F..;G.l9FRich.l9F........PE..d.....}X.........." .........`.......................................................y....`A................................................p......................F...)......p...PX..T............................'...............O...............................text............................... ..`.rdata..<u.......v..................@..@.data....$...........r..............@....pdata.............................@..@.rsrc................4..............@..@.reloc..p............:..............@..B................................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):1141016
                                                                                                                                                                                          Entropy (8bit):5.435066249596469
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:12288:P3EYbfjwR6nbsonRiPDjRrO5184EPYPx++ZiLKGZ5KXyVH4eD1JD:PUYbMB0IDJcjEwPgPOG6Xyd461JD
                                                                                                                                                                                          MD5:1905B5D0F945499441E8CD58EB123D86
                                                                                                                                                                                          SHA1:117E584E6FCC0E8CFC8E24E3AF527999F14BAC30
                                                                                                                                                                                          SHA-256:B1788B81FA160E5120451F9252C7745CDDE98B8CE59BF273A3DD867BB034C532
                                                                                                                                                                                          SHA-512:ED88CD7E3259239A0C8D42D95FA2447FC454A944C849FA97449AD88871236FEFDAFE21DBFA6E9B5D8A54DDF1D5281EC34D314CB93D47CE7B13912A69D284F522
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......D|............eG.....c.....c.....c.....c.....b....Ke.......Q...b.....b.....b+.....b....Rich...........................PE..d....k.d.........." ...$.@..........P*..............................................J.....`.............................................X............`.......P..0....:.../...p.......]..T............................[..@............P..x............................text....>.......@.................. ..`.rdata.......P.......D..............@..@.data...H....0......................@....pdata..0....P.......&..............@..@.rsrc........`......................@..@.reloc.......p.......8..............@..B................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):133632
                                                                                                                                                                                          Entropy (8bit):5.851354810898845
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3072:HPwB2zC1vwC3XetCf5RlRVFhLaNKPAyymhNYm9b9e:HIB2zkvwGXetCfDlRVlPAyLYm9
                                                                                                                                                                                          MD5:1D6762B494DC9E60CA95F7238AE1FB14
                                                                                                                                                                                          SHA1:AA0397D96A0ED41B2F03352049DAFE040D59AD5D
                                                                                                                                                                                          SHA-256:FAE5323E2119A8F678055F4244177B5806C7B6B171B1945168F685631B913664
                                                                                                                                                                                          SHA-512:0B561F651161A34C37FF8D115F154C52202F573D049681F8CDD7BBA2E966BB8203780C19BA824B4A693EF12EF1EEEF6AEEEF96EB369E4B6129F1DEB6B26AAA00
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........I^.f'..f'..f'......f'...&..f'...#..f'...$..f'.o.&..f'..."..f'...&..f'..f&..g'.o....f'.o.'..f'.o.%..f'.Rich.f'.................PE..d......d.........." .........................................................P............`..........................................................0..\....................@..$....v..T............................<..8............0..........@....................text...$........................... ..`.rdata......0......................@..@.data...x(......."..................@....pdata..............................@..@.rsrc...\....0......................@..@.reloc..$....@......................@..B................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):217088
                                                                                                                                                                                          Entropy (8bit):5.9334514167188255
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:3072:4WLvun+3wdpugco/89ClzK0UPI7Txi9jv19DTTVqM2HOloTD:5LWn+gdpugcok9C9OPI7g/qM+N
                                                                                                                                                                                          MD5:3C81C0CEEBB2B5C224A56C024021EFAD
                                                                                                                                                                                          SHA1:AEE4DDCC136856ED2297D7DBDC781A266CF7EAB9
                                                                                                                                                                                          SHA-256:6085BC00A1F157C4D2CC0609E20E1E20D2572FE6498DE3BEC4C9C7BEBCFBB629
                                                                                                                                                                                          SHA-512:F2D6C06DA4F56A8119A931B5895C446432152737B4A7AE95C2B91B1638E961DA78833728D62E206E1D886E7C36D7BED3FA4403D0B57A017523DD831DD6B7117F
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{e..............b.......o.......o.......o.......o......fo.......q..........k...fo......fo......fo......Rich............PE..d......d.........." .........r...... .....................................................`............................................d...T........`..\.... ..h:...........p.......L..T............................M..8............................................text............................... ..`.rdata..............................@..@.data...p?.......:..................@....pdata..h:... ...<..................@..@.rsrc...\....`.......D..............@..@.reloc.......p.......H..............@..B........................................................................................................................................................................................................................................................
                                                                                                                                                                                          Process:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                          Size (bytes):53248
                                                                                                                                                                                          Entropy (8bit):5.669637245620579
                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                          SSDEEP:768:y00BG7eFeMpMIO4gbRqnnuf0yY0EC0tDQ5t90y2ICr:y0g4eFe9IO4gbRnxY0EPtDWAyyr
                                                                                                                                                                                          MD5:936B26A67E6C7788C3A5268F478E01B8
                                                                                                                                                                                          SHA1:0EE92F0A97A14FCD45865667ED02B278794B2FDF
                                                                                                                                                                                          SHA-256:0459439EF3EFA0E0FC2B8CA3F0245826E9BBD7E8F3266276398921A4AA899FBD
                                                                                                                                                                                          SHA-512:BFE37390DA24CC9422CABBBBBC7733D89F61D73ECC3765FE494B5A7BD044E4FFB629F1BB4A28437FE9AD169AE65F2338C15D689F381F9E745C44F2741388860B
                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........YI..8'E.8'E.8'E.@.E.8'E.M&D.8'E.M"D.8'E.M#D.8'E.M$D.8'EZM&D.8'E.S&D.8'E.8&E.8'EZM.D.8'EZM'D.8'EZM%D.8'ERich.8'E........................PE..d......d.........." .....l...`......he....................................... ............`.........................................P...X...............l.......................L...(...T...............................8............................................text...rk.......l.................. ..`.rdata...B.......D...p..............@..@.data...............................@....pdata..............................@..@.rsrc...l...........................@..@.reloc..L...........................@..B........................................................................................................................................................................................................................................
                                                                                                                                                                                          File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                                                                                          Entropy (8bit):7.9970021359289385
                                                                                                                                                                                          TrID:
                                                                                                                                                                                          • Win64 Executable GUI (202006/5) 92.65%
                                                                                                                                                                                          • Win64 Executable (generic) (12005/4) 5.51%
                                                                                                                                                                                          • Generic Win/DOS Executable (2004/3) 0.92%
                                                                                                                                                                                          • DOS Executable Generic (2002/1) 0.92%
                                                                                                                                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                                          File name:Chione.exe
                                                                                                                                                                                          File size:18'662'191 bytes
                                                                                                                                                                                          MD5:d19b768f3d2a63120e658849b169dbe6
                                                                                                                                                                                          SHA1:4857f30e4aec8071a97716db38b6b2e374578e5f
                                                                                                                                                                                          SHA256:daf9c549f15e131cda7ff753f641328925f6f2a174a8dafb74bbc65c8cce6332
                                                                                                                                                                                          SHA512:317f323f9e2ca9e517d599e2fee161c8331118cc468818762c8679ad835d6e1dd04d794efb3c9c4e8e09765bd15ba94d69ec2eda113113cfcb71b0300ccb00f5
                                                                                                                                                                                          SSDEEP:393216:SBFyjkVfk3meXcGfd/aHW8p2loEfN/Tn+8:SawVfaF5FUW8p2loEVDv
                                                                                                                                                                                          TLSH:20173319F72A08F8EDAA4437E5D48406AE1234EB57B9D68B06F47C510E9F0CC6D3AF61
                                                                                                                                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U.Q...?...?...?.Z.<...?.Z.:...?.Z.;...?.......?...:.9.?...;...?...<...?.Z.>...?...>...?.+.;...?.+.=...?.Rich..?................
                                                                                                                                                                                          Icon Hash:0f61cdd0566d2917
                                                                                                                                                                                          Entrypoint:0x14000c2f0
                                                                                                                                                                                          Entrypoint Section:.text
                                                                                                                                                                                          Digitally signed:false
                                                                                                                                                                                          Imagebase:0x140000000
                                                                                                                                                                                          Subsystem:windows gui
                                                                                                                                                                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                                                                                                                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                                                                                                                          Time Stamp:0x662BA1B3 [Fri Apr 26 12:44:35 2024 UTC]
                                                                                                                                                                                          TLS Callbacks:
                                                                                                                                                                                          CLR (.Net) Version:
                                                                                                                                                                                          OS Version Major:5
                                                                                                                                                                                          OS Version Minor:2
                                                                                                                                                                                          File Version Major:5
                                                                                                                                                                                          File Version Minor:2
                                                                                                                                                                                          Subsystem Version Major:5
                                                                                                                                                                                          Subsystem Version Minor:2
                                                                                                                                                                                          Import Hash:1af6c885af093afc55142c2f1761dbe8
                                                                                                                                                                                          Instruction
                                                                                                                                                                                          dec eax
                                                                                                                                                                                          sub esp, 28h
                                                                                                                                                                                          call 00007F7734BDD8ACh
                                                                                                                                                                                          dec eax
                                                                                                                                                                                          add esp, 28h
                                                                                                                                                                                          jmp 00007F7734BDD4BFh
                                                                                                                                                                                          int3
                                                                                                                                                                                          int3
                                                                                                                                                                                          int3
                                                                                                                                                                                          int3
                                                                                                                                                                                          int3
                                                                                                                                                                                          int3
                                                                                                                                                                                          int3
                                                                                                                                                                                          int3
                                                                                                                                                                                          int3
                                                                                                                                                                                          int3
                                                                                                                                                                                          int3
                                                                                                                                                                                          int3
                                                                                                                                                                                          int3
                                                                                                                                                                                          int3
                                                                                                                                                                                          dec eax
                                                                                                                                                                                          sub esp, 28h
                                                                                                                                                                                          call 00007F7734BDDE24h
                                                                                                                                                                                          test eax, eax
                                                                                                                                                                                          je 00007F7734BDD663h
                                                                                                                                                                                          dec eax
                                                                                                                                                                                          mov eax, dword ptr [00000030h]
                                                                                                                                                                                          dec eax
                                                                                                                                                                                          mov ecx, dword ptr [eax+08h]
                                                                                                                                                                                          jmp 00007F7734BDD647h
                                                                                                                                                                                          dec eax
                                                                                                                                                                                          cmp ecx, eax
                                                                                                                                                                                          je 00007F7734BDD656h
                                                                                                                                                                                          xor eax, eax
                                                                                                                                                                                          dec eax
                                                                                                                                                                                          cmpxchg dword ptr [0003418Ch], ecx
                                                                                                                                                                                          jne 00007F7734BDD630h
                                                                                                                                                                                          xor al, al
                                                                                                                                                                                          dec eax
                                                                                                                                                                                          add esp, 28h
                                                                                                                                                                                          ret
                                                                                                                                                                                          mov al, 01h
                                                                                                                                                                                          jmp 00007F7734BDD639h
                                                                                                                                                                                          int3
                                                                                                                                                                                          int3
                                                                                                                                                                                          int3
                                                                                                                                                                                          inc eax
                                                                                                                                                                                          push ebx
                                                                                                                                                                                          dec eax
                                                                                                                                                                                          sub esp, 20h
                                                                                                                                                                                          movzx eax, byte ptr [00034177h]
                                                                                                                                                                                          test ecx, ecx
                                                                                                                                                                                          mov ebx, 00000001h
                                                                                                                                                                                          cmove eax, ebx
                                                                                                                                                                                          mov byte ptr [00034167h], al
                                                                                                                                                                                          call 00007F7734BDDC23h
                                                                                                                                                                                          call 00007F7734BDED42h
                                                                                                                                                                                          test al, al
                                                                                                                                                                                          jne 00007F7734BDD646h
                                                                                                                                                                                          xor al, al
                                                                                                                                                                                          jmp 00007F7734BDD656h
                                                                                                                                                                                          call 00007F7734BEBCE1h
                                                                                                                                                                                          test al, al
                                                                                                                                                                                          jne 00007F7734BDD64Bh
                                                                                                                                                                                          xor ecx, ecx
                                                                                                                                                                                          call 00007F7734BDED52h
                                                                                                                                                                                          jmp 00007F7734BDD62Ch
                                                                                                                                                                                          mov al, bl
                                                                                                                                                                                          dec eax
                                                                                                                                                                                          add esp, 20h
                                                                                                                                                                                          pop ebx
                                                                                                                                                                                          ret
                                                                                                                                                                                          int3
                                                                                                                                                                                          int3
                                                                                                                                                                                          int3
                                                                                                                                                                                          inc eax
                                                                                                                                                                                          push ebx
                                                                                                                                                                                          dec eax
                                                                                                                                                                                          sub esp, 20h
                                                                                                                                                                                          cmp byte ptr [0003412Ch], 00000000h
                                                                                                                                                                                          mov ebx, ecx
                                                                                                                                                                                          jne 00007F7734BDD6A9h
                                                                                                                                                                                          cmp ecx, 01h
                                                                                                                                                                                          jnbe 00007F7734BDD6ACh
                                                                                                                                                                                          call 00007F7734BDDD8Ah
                                                                                                                                                                                          test eax, eax
                                                                                                                                                                                          je 00007F7734BDD66Ah
                                                                                                                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x3cee40x78.rdata
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x460000x4254.rsrc
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x420000x22c8.pdata
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x4b0000x758.reloc
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x3a4200x1c.rdata
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3a2e00x140.rdata
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x2b0000x420.rdata
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                          .text0x10000x29d900x29e0015c814a42215e290d8bab54e3db4f28eFalse0.5531133395522388data6.488360740396217IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                          .rdata0x2b0000x12d0c0x12e005aeecbf4ca98104f7457ee3f2fabff41False0.5158319536423841data5.820135747690317IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                          .data0x3e0000x33480xe00e1f21cabb4e5e084c6e11e610d715023False0.13253348214285715Matlab v4 mat-file (little endian) f\324\377\3772\242\337-\231+, text, rows 4294967295, columns 01.8227234993173287IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                          .pdata0x420000x22c80x2400b142de92a6283807ff34839c180f053cFalse0.4743923611111111data5.326103127679494IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                          _RDATA0x450000x15c0x200ee29821d11e5dd21c3e807a502fa5813False0.38671875data2.83326547900447IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                          .rsrc0x460000x42540x44000e110480a3b6cb988e35dfbcbcb25487False0.9289981617647058data7.87796325704466IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                          .reloc0x4b0000x7580x8007813f7270f60606010808eaa88aee14bFalse0.5439453125data5.24418466384704IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                          RT_ICON0x460e80x3c45PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9900836087886448
                                                                                                                                                                                          RT_GROUP_ICON0x49d300x14data1.05
                                                                                                                                                                                          RT_MANIFEST0x49d440x50dXML 1.0 document, ASCII text0.4694508894044857
                                                                                                                                                                                          DLLImport
                                                                                                                                                                                          USER32.dllCreateWindowExW, MessageBoxW, MessageBoxA, SystemParametersInfoW, DestroyIcon, SetWindowLongPtrW, GetWindowLongPtrW, GetClientRect, InvalidateRect, ReleaseDC, GetDC, DrawTextW, GetDialogBaseUnits, EndDialog, DialogBoxIndirectParamW, MoveWindow, SendMessageW
                                                                                                                                                                                          COMCTL32.dll
                                                                                                                                                                                          KERNEL32.dllIsValidCodePage, GetStringTypeW, GetFileAttributesExW, HeapReAlloc, FlushFileBuffers, GetCurrentDirectoryW, GetACP, GetOEMCP, GetModuleHandleW, MulDiv, GetLastError, SetDllDirectoryW, GetModuleFileNameW, CreateSymbolicLinkW, GetProcAddress, GetCommandLineW, GetEnvironmentVariableW, GetCPInfo, ExpandEnvironmentStringsW, CreateDirectoryW, GetTempPathW, WaitForSingleObject, Sleep, GetExitCodeProcess, CreateProcessW, GetStartupInfoW, FreeLibrary, LoadLibraryExW, SetConsoleCtrlHandler, FindClose, FindFirstFileExW, CloseHandle, GetCurrentProcess, LocalFree, FormatMessageW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetProcessHeap, GetTimeZoneInformation, HeapSize, WriteConsoleW, SetEndOfFile, SetEnvironmentVariableW, RtlUnwindEx, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, RaiseException, RtlPcToFileHeader, GetCommandLineA, CreateFileW, GetDriveTypeW, GetFileInformationByHandle, GetFileType, PeekNamedPipe, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, GetFullPathNameW, RemoveDirectoryW, FindNextFileW, SetStdHandle, DeleteFileW, ReadFile, GetStdHandle, WriteFile, ExitProcess, GetModuleHandleExW, HeapFree, GetConsoleMode, ReadConsoleW, SetFilePointerEx, GetConsoleOutputCP, GetFileSizeEx, HeapAlloc, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, CompareStringW, LCMapStringW
                                                                                                                                                                                          ADVAPI32.dllOpenProcessToken, GetTokenInformation, ConvertStringSecurityDescriptorToSecurityDescriptorW, ConvertSidToStringSidW
                                                                                                                                                                                          GDI32.dllSelectObject, DeleteObject, CreateFontIndirectW
                                                                                                                                                                                          No network behavior found

                                                                                                                                                                                          Click to jump to process

                                                                                                                                                                                          Click to jump to process

                                                                                                                                                                                          Click to dive into process behavior distribution

                                                                                                                                                                                          Click to jump to process

                                                                                                                                                                                          Target ID:0
                                                                                                                                                                                          Start time:08:19:01
                                                                                                                                                                                          Start date:26/12/2024
                                                                                                                                                                                          Path:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                          Commandline:"C:\Users\user\Desktop\Chione.exe"
                                                                                                                                                                                          Imagebase:0x7ff62ef90000
                                                                                                                                                                                          File size:18'662'191 bytes
                                                                                                                                                                                          MD5 hash:D19B768F3D2A63120E658849B169DBE6
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                          Reputation:low
                                                                                                                                                                                          Has exited:false

                                                                                                                                                                                          Target ID:1
                                                                                                                                                                                          Start time:08:19:08
                                                                                                                                                                                          Start date:26/12/2024
                                                                                                                                                                                          Path:C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                          Commandline:"C:\Users\user\Desktop\Chione.exe"
                                                                                                                                                                                          Imagebase:0x7ff62ef90000
                                                                                                                                                                                          File size:18'662'191 bytes
                                                                                                                                                                                          MD5 hash:D19B768F3D2A63120E658849B169DBE6
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                          Reputation:low
                                                                                                                                                                                          Has exited:false

                                                                                                                                                                                          Target ID:2
                                                                                                                                                                                          Start time:08:19:09
                                                                                                                                                                                          Start date:26/12/2024
                                                                                                                                                                                          Path:C:\Windows\System32\cmd.exe
                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                          Commandline:C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                          Imagebase:0x7ff67de30000
                                                                                                                                                                                          File size:289'792 bytes
                                                                                                                                                                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                          Reputation:high
                                                                                                                                                                                          Has exited:true

                                                                                                                                                                                          Target ID:3
                                                                                                                                                                                          Start time:08:19:09
                                                                                                                                                                                          Start date:26/12/2024
                                                                                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                          Imagebase:0x7ff7699e0000
                                                                                                                                                                                          File size:862'208 bytes
                                                                                                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                          Reputation:high
                                                                                                                                                                                          Has exited:true

                                                                                                                                                                                          Reset < >

                                                                                                                                                                                            Execution Graph

                                                                                                                                                                                            Execution Coverage:10.6%
                                                                                                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                            Signature Coverage:15.1%
                                                                                                                                                                                            Total number of Nodes:2000
                                                                                                                                                                                            Total number of Limit Nodes:39
                                                                                                                                                                                            execution_graph 15187 7ff62ef9b340 15188 7ff62ef9b36e 15187->15188 15189 7ff62ef9b355 15187->15189 15189->15188 15192 7ff62efadcbc 15189->15192 15193 7ff62efadd07 15192->15193 15194 7ff62efadccb _get_daylight 15192->15194 15202 7ff62efa55c4 15193->15202 15194->15193 15196 7ff62efadcee HeapAlloc 15194->15196 15199 7ff62efb3d00 15194->15199 15196->15194 15197 7ff62ef9b3cc 15196->15197 15205 7ff62efb3d40 15199->15205 15211 7ff62efab988 GetLastError 15202->15211 15204 7ff62efa55cd 15204->15197 15210 7ff62efb0db8 EnterCriticalSection 15205->15210 15212 7ff62efab9c9 FlsSetValue 15211->15212 15218 7ff62efab9ac 15211->15218 15213 7ff62efab9b9 SetLastError 15212->15213 15214 7ff62efab9db 15212->15214 15213->15204 15228 7ff62efaf258 15214->15228 15218->15212 15218->15213 15219 7ff62efaba08 FlsSetValue 15222 7ff62efaba14 FlsSetValue 15219->15222 15223 7ff62efaba26 15219->15223 15220 7ff62efab9f8 FlsSetValue 15221 7ff62efaba01 15220->15221 15235 7ff62efab00c 15221->15235 15222->15221 15241 7ff62efab5b8 15223->15241 15233 7ff62efaf269 _get_daylight 15228->15233 15229 7ff62efaf2ba 15231 7ff62efa55c4 _get_daylight 10 API calls 15229->15231 15230 7ff62efaf29e HeapAlloc 15232 7ff62efab9ea 15230->15232 15230->15233 15231->15232 15232->15219 15232->15220 15233->15229 15233->15230 15234 7ff62efb3d00 _get_daylight 2 API calls 15233->15234 15234->15233 15236 7ff62efab011 RtlFreeHeap 15235->15236 15237 7ff62efab040 15235->15237 15236->15237 15238 7ff62efab02c GetLastError 15236->15238 15237->15213 15239 7ff62efab039 __free_lconv_mon 15238->15239 15240 7ff62efa55c4 _get_daylight 9 API calls 15239->15240 15240->15237 15246 7ff62efab490 15241->15246 15258 7ff62efb0db8 EnterCriticalSection 15246->15258 15264 7ff62efb1038 15265 7ff62efb105c 15264->15265 15267 7ff62efb106c 15264->15267 15266 7ff62efa55c4 _get_daylight 11 API calls 15265->15266 15289 7ff62efb1061 15266->15289 15268 7ff62efb134c 15267->15268 15269 7ff62efb108e 15267->15269 15270 7ff62efa55c4 _get_daylight 11 API calls 15268->15270 15272 7ff62efb10af 15269->15272 15408 7ff62efb16f4 15269->15408 15271 7ff62efb1351 15270->15271 15273 7ff62efab00c __free_lconv_mon 11 API calls 15271->15273 15275 7ff62efb1121 15272->15275 15277 7ff62efb10d5 15272->15277 15281 7ff62efb1115 15272->15281 15273->15289 15279 7ff62efaf258 _get_daylight 11 API calls 15275->15279 15293 7ff62efb10e4 15275->15293 15276 7ff62efb11ce 15288 7ff62efb11eb 15276->15288 15294 7ff62efb123d 15276->15294 15423 7ff62efa9d50 15277->15423 15282 7ff62efb1137 15279->15282 15281->15276 15281->15293 15429 7ff62efb7afc 15281->15429 15285 7ff62efab00c __free_lconv_mon 11 API calls 15282->15285 15284 7ff62efab00c __free_lconv_mon 11 API calls 15284->15289 15290 7ff62efb1145 15285->15290 15286 7ff62efb10df 15291 7ff62efa55c4 _get_daylight 11 API calls 15286->15291 15287 7ff62efb10fd 15287->15281 15296 7ff62efb16f4 45 API calls 15287->15296 15292 7ff62efab00c __free_lconv_mon 11 API calls 15288->15292 15290->15281 15290->15293 15298 7ff62efaf258 _get_daylight 11 API calls 15290->15298 15291->15293 15295 7ff62efb11f4 15292->15295 15293->15284 15294->15293 15297 7ff62efb3b4c 40 API calls 15294->15297 15305 7ff62efb11f9 15295->15305 15465 7ff62efb3b4c 15295->15465 15296->15281 15299 7ff62efb127a 15297->15299 15301 7ff62efb1167 15298->15301 15302 7ff62efab00c __free_lconv_mon 11 API calls 15299->15302 15306 7ff62efab00c __free_lconv_mon 11 API calls 15301->15306 15307 7ff62efb1284 15302->15307 15303 7ff62efb1225 15308 7ff62efab00c __free_lconv_mon 11 API calls 15303->15308 15304 7ff62efb1340 15309 7ff62efab00c __free_lconv_mon 11 API calls 15304->15309 15305->15304 15310 7ff62efaf258 _get_daylight 11 API calls 15305->15310 15306->15281 15307->15293 15307->15305 15308->15305 15309->15289 15311 7ff62efb12c8 15310->15311 15312 7ff62efb12d0 15311->15312 15313 7ff62efb12d9 15311->15313 15314 7ff62efab00c __free_lconv_mon 11 API calls 15312->15314 15395 7ff62efaab3c 15313->15395 15316 7ff62efb12d7 15314->15316 15321 7ff62efab00c __free_lconv_mon 11 API calls 15316->15321 15318 7ff62efb12f0 15474 7ff62efb7c14 15318->15474 15319 7ff62efb137b 15404 7ff62efaafc4 IsProcessorFeaturePresent 15319->15404 15321->15289 15325 7ff62efb1338 15330 7ff62efab00c __free_lconv_mon 11 API calls 15325->15330 15326 7ff62efb1317 15328 7ff62efa55c4 _get_daylight 11 API calls 15326->15328 15331 7ff62efb131c 15328->15331 15330->15304 15332 7ff62efab00c __free_lconv_mon 11 API calls 15331->15332 15332->15316 15396 7ff62efaab53 15395->15396 15397 7ff62efaab49 15395->15397 15398 7ff62efa55c4 _get_daylight 11 API calls 15396->15398 15397->15396 15402 7ff62efaab6e 15397->15402 15399 7ff62efaab5a 15398->15399 15493 7ff62efaafa4 15399->15493 15401 7ff62efaab66 15401->15318 15401->15319 15402->15401 15403 7ff62efa55c4 _get_daylight 11 API calls 15402->15403 15403->15399 15405 7ff62efaafd7 15404->15405 15533 7ff62efaacd8 15405->15533 15409 7ff62efb1711 15408->15409 15410 7ff62efb1729 15408->15410 15409->15272 15411 7ff62efaf258 _get_daylight 11 API calls 15410->15411 15412 7ff62efb174d 15411->15412 15413 7ff62efb17ae 15412->15413 15417 7ff62efaf258 _get_daylight 11 API calls 15412->15417 15418 7ff62efab00c __free_lconv_mon 11 API calls 15412->15418 15419 7ff62efaab3c __std_exception_copy 37 API calls 15412->15419 15420 7ff62efb17bd 15412->15420 15422 7ff62efb17d2 15412->15422 15415 7ff62efab00c __free_lconv_mon 11 API calls 15413->15415 15415->15409 15417->15412 15418->15412 15419->15412 15421 7ff62efaafc4 _wfindfirst32i64 17 API calls 15420->15421 15421->15422 15555 7ff62efaab9c 15422->15555 15424 7ff62efa9d60 15423->15424 15425 7ff62efa9d69 15423->15425 15424->15425 15621 7ff62efa9828 15424->15621 15425->15286 15425->15287 15430 7ff62efb7b09 15429->15430 15431 7ff62efb6cac 15429->15431 15433 7ff62efa5098 45 API calls 15430->15433 15432 7ff62efb6cb9 15431->15432 15438 7ff62efb6cef 15431->15438 15434 7ff62efa55c4 _get_daylight 11 API calls 15432->15434 15453 7ff62efb6c60 15432->15453 15435 7ff62efb7b3d 15433->15435 15437 7ff62efb6cc3 15434->15437 15439 7ff62efb7b42 15435->15439 15444 7ff62efb7b53 15435->15444 15445 7ff62efb7b6a 15435->15445 15436 7ff62efb6d19 15440 7ff62efa55c4 _get_daylight 11 API calls 15436->15440 15442 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 15437->15442 15438->15436 15443 7ff62efb6d3e 15438->15443 15439->15281 15441 7ff62efb6d1e 15440->15441 15446 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 15441->15446 15448 7ff62efb6cce 15442->15448 15452 7ff62efa5098 45 API calls 15443->15452 15456 7ff62efb6d29 15443->15456 15447 7ff62efa55c4 _get_daylight 11 API calls 15444->15447 15450 7ff62efb7b74 15445->15450 15451 7ff62efb7b86 15445->15451 15446->15456 15449 7ff62efb7b58 15447->15449 15448->15281 15454 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 15449->15454 15455 7ff62efa55c4 _get_daylight 11 API calls 15450->15455 15457 7ff62efb7bae 15451->15457 15458 7ff62efb7b97 15451->15458 15452->15456 15453->15281 15454->15439 15460 7ff62efb7b79 15455->15460 15456->15281 15915 7ff62efb9924 15457->15915 15906 7ff62efb6cfc 15458->15906 15463 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 15460->15463 15463->15439 15464 7ff62efa55c4 _get_daylight 11 API calls 15464->15439 15466 7ff62efb3b6e 15465->15466 15467 7ff62efb3b8b 15465->15467 15466->15467 15468 7ff62efb3b7c 15466->15468 15469 7ff62efb3b95 15467->15469 15967 7ff62efb8608 15467->15967 15470 7ff62efa55c4 _get_daylight 11 API calls 15468->15470 15955 7ff62efb0fbc 15469->15955 15473 7ff62efb3b81 __scrt_get_show_window_mode 15470->15473 15473->15303 15475 7ff62efa5098 45 API calls 15474->15475 15476 7ff62efb7c7a 15475->15476 15477 7ff62efb7c88 15476->15477 15974 7ff62efaf4e4 15476->15974 15977 7ff62efa5684 15477->15977 15481 7ff62efb7d74 15484 7ff62efb7d85 15481->15484 15485 7ff62efab00c __free_lconv_mon 11 API calls 15481->15485 15482 7ff62efa5098 45 API calls 15483 7ff62efb7cf7 15482->15483 15487 7ff62efaf4e4 5 API calls 15483->15487 15489 7ff62efb7d00 15483->15489 15486 7ff62efb1313 15484->15486 15488 7ff62efab00c __free_lconv_mon 11 API calls 15484->15488 15485->15484 15486->15325 15486->15326 15487->15489 15488->15486 15490 7ff62efa5684 14 API calls 15489->15490 15491 7ff62efb7d5b 15490->15491 15491->15481 15492 7ff62efb7d63 SetEnvironmentVariableW 15491->15492 15492->15481 15495 7ff62efaae3c 15493->15495 15496 7ff62efaae67 15495->15496 15499 7ff62efaaed8 15496->15499 15498 7ff62efaae8e 15507 7ff62efaac20 15499->15507 15504 7ff62efaafc4 _wfindfirst32i64 17 API calls 15506 7ff62efaafa3 15504->15506 15505 7ff62efaaf13 15505->15498 15508 7ff62efaac77 15507->15508 15509 7ff62efaac3c GetLastError 15507->15509 15508->15505 15513 7ff62efaac8c 15508->15513 15510 7ff62efaac4c 15509->15510 15516 7ff62efaba50 15510->15516 15514 7ff62efaacc0 15513->15514 15515 7ff62efaaca8 GetLastError SetLastError 15513->15515 15514->15504 15514->15505 15515->15514 15517 7ff62efaba6f FlsGetValue 15516->15517 15518 7ff62efaba8a FlsSetValue 15516->15518 15519 7ff62efaba84 15517->15519 15530 7ff62efaac67 SetLastError 15517->15530 15520 7ff62efaba97 15518->15520 15518->15530 15519->15518 15521 7ff62efaf258 _get_daylight 11 API calls 15520->15521 15522 7ff62efabaa6 15521->15522 15523 7ff62efabac4 FlsSetValue 15522->15523 15524 7ff62efabab4 FlsSetValue 15522->15524 15526 7ff62efabad0 FlsSetValue 15523->15526 15527 7ff62efabae2 15523->15527 15525 7ff62efababd 15524->15525 15528 7ff62efab00c __free_lconv_mon 11 API calls 15525->15528 15526->15525 15529 7ff62efab5b8 _get_daylight 11 API calls 15527->15529 15528->15530 15531 7ff62efabaea 15529->15531 15530->15508 15532 7ff62efab00c __free_lconv_mon 11 API calls 15531->15532 15532->15530 15534 7ff62efaad12 _wfindfirst32i64 __scrt_get_show_window_mode 15533->15534 15535 7ff62efaad3a RtlCaptureContext RtlLookupFunctionEntry 15534->15535 15536 7ff62efaad74 RtlVirtualUnwind 15535->15536 15537 7ff62efaadaa IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15535->15537 15536->15537 15539 7ff62efaadfc _wfindfirst32i64 15537->15539 15541 7ff62ef9bdc0 15539->15541 15542 7ff62ef9bdc9 15541->15542 15543 7ff62ef9bdd4 GetCurrentProcess TerminateProcess 15542->15543 15544 7ff62ef9be20 IsProcessorFeaturePresent 15542->15544 15545 7ff62ef9be38 15544->15545 15550 7ff62ef9c014 RtlCaptureContext 15545->15550 15551 7ff62ef9c02e RtlLookupFunctionEntry 15550->15551 15552 7ff62ef9c044 RtlVirtualUnwind 15551->15552 15553 7ff62ef9be4b 15551->15553 15552->15551 15552->15553 15554 7ff62ef9bde0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 15553->15554 15564 7ff62efb3dc0 15555->15564 15590 7ff62efb3d78 15564->15590 15595 7ff62efb0db8 EnterCriticalSection 15590->15595 15622 7ff62efa9841 15621->15622 15635 7ff62efa983d 15621->15635 15644 7ff62efb2d60 15622->15644 15627 7ff62efa985f 15670 7ff62efa990c 15627->15670 15628 7ff62efa9853 15629 7ff62efab00c __free_lconv_mon 11 API calls 15628->15629 15629->15635 15632 7ff62efab00c __free_lconv_mon 11 API calls 15633 7ff62efa9886 15632->15633 15634 7ff62efab00c __free_lconv_mon 11 API calls 15633->15634 15634->15635 15635->15425 15636 7ff62efa9b7c 15635->15636 15637 7ff62efa9ba5 15636->15637 15640 7ff62efa9bbe 15636->15640 15637->15425 15638 7ff62efb05c8 WideCharToMultiByte 15638->15640 15639 7ff62efaf258 _get_daylight 11 API calls 15639->15640 15640->15637 15640->15638 15640->15639 15641 7ff62efa9c4e 15640->15641 15643 7ff62efab00c __free_lconv_mon 11 API calls 15640->15643 15642 7ff62efab00c __free_lconv_mon 11 API calls 15641->15642 15642->15637 15643->15640 15645 7ff62efb2d6d 15644->15645 15649 7ff62efa9846 15644->15649 15689 7ff62efab8e4 15645->15689 15650 7ff62efb309c GetEnvironmentStringsW 15649->15650 15651 7ff62efa984b 15650->15651 15652 7ff62efb30cc 15650->15652 15651->15627 15651->15628 15652->15652 15653 7ff62efb05c8 WideCharToMultiByte 15652->15653 15654 7ff62efb311d 15653->15654 15655 7ff62efb3124 FreeEnvironmentStringsW 15654->15655 15656 7ff62efadcbc _fread_nolock 12 API calls 15654->15656 15655->15651 15657 7ff62efb3137 15656->15657 15658 7ff62efb313f 15657->15658 15659 7ff62efb3148 15657->15659 15660 7ff62efab00c __free_lconv_mon 11 API calls 15658->15660 15661 7ff62efb05c8 WideCharToMultiByte 15659->15661 15662 7ff62efb3146 15660->15662 15663 7ff62efb316b 15661->15663 15662->15655 15664 7ff62efb316f 15663->15664 15665 7ff62efb3179 15663->15665 15666 7ff62efab00c __free_lconv_mon 11 API calls 15664->15666 15667 7ff62efab00c __free_lconv_mon 11 API calls 15665->15667 15668 7ff62efb3177 FreeEnvironmentStringsW 15666->15668 15667->15668 15668->15651 15671 7ff62efa9931 15670->15671 15672 7ff62efaf258 _get_daylight 11 API calls 15671->15672 15673 7ff62efa9967 15672->15673 15675 7ff62efa99e2 15673->15675 15678 7ff62efaf258 _get_daylight 11 API calls 15673->15678 15679 7ff62efa99d1 15673->15679 15680 7ff62efaab3c __std_exception_copy 37 API calls 15673->15680 15684 7ff62efa9a07 15673->15684 15685 7ff62efa996f 15673->15685 15687 7ff62efab00c __free_lconv_mon 11 API calls 15673->15687 15674 7ff62efab00c __free_lconv_mon 11 API calls 15676 7ff62efa9867 15674->15676 15677 7ff62efab00c __free_lconv_mon 11 API calls 15675->15677 15676->15632 15677->15676 15678->15673 15900 7ff62efa9b38 15679->15900 15680->15673 15683 7ff62efab00c __free_lconv_mon 11 API calls 15683->15685 15686 7ff62efaafc4 _wfindfirst32i64 17 API calls 15684->15686 15685->15674 15688 7ff62efa9a1a 15686->15688 15687->15673 15690 7ff62efab910 FlsSetValue 15689->15690 15691 7ff62efab8f5 FlsGetValue 15689->15691 15692 7ff62efab902 15690->15692 15694 7ff62efab91d 15690->15694 15691->15692 15693 7ff62efab90a 15691->15693 15695 7ff62efab908 15692->15695 15696 7ff62efaab9c __CxxCallCatchBlock 45 API calls 15692->15696 15693->15690 15697 7ff62efaf258 _get_daylight 11 API calls 15694->15697 15709 7ff62efb2a34 15695->15709 15698 7ff62efab985 15696->15698 15699 7ff62efab92c 15697->15699 15700 7ff62efab94a FlsSetValue 15699->15700 15701 7ff62efab93a FlsSetValue 15699->15701 15702 7ff62efab968 15700->15702 15703 7ff62efab956 FlsSetValue 15700->15703 15704 7ff62efab943 15701->15704 15705 7ff62efab5b8 _get_daylight 11 API calls 15702->15705 15703->15704 15706 7ff62efab00c __free_lconv_mon 11 API calls 15704->15706 15707 7ff62efab970 15705->15707 15706->15692 15708 7ff62efab00c __free_lconv_mon 11 API calls 15707->15708 15708->15695 15732 7ff62efb2ca4 15709->15732 15711 7ff62efb2a69 15747 7ff62efb2734 15711->15747 15714 7ff62efadcbc _fread_nolock 12 API calls 15715 7ff62efb2a97 15714->15715 15716 7ff62efb2a9f 15715->15716 15718 7ff62efb2aae 15715->15718 15717 7ff62efab00c __free_lconv_mon 11 API calls 15716->15717 15730 7ff62efb2a86 15717->15730 15718->15718 15754 7ff62efb2ddc 15718->15754 15721 7ff62efb2baa 15722 7ff62efa55c4 _get_daylight 11 API calls 15721->15722 15723 7ff62efb2baf 15722->15723 15726 7ff62efab00c __free_lconv_mon 11 API calls 15723->15726 15724 7ff62efb2c05 15731 7ff62efb2c6c 15724->15731 15765 7ff62efb2564 15724->15765 15725 7ff62efb2bc4 15725->15724 15727 7ff62efab00c __free_lconv_mon 11 API calls 15725->15727 15726->15730 15727->15724 15729 7ff62efab00c __free_lconv_mon 11 API calls 15729->15730 15730->15649 15731->15729 15733 7ff62efb2cc7 15732->15733 15736 7ff62efb2cd1 15733->15736 15780 7ff62efb0db8 EnterCriticalSection 15733->15780 15735 7ff62efb2d43 15735->15711 15736->15735 15740 7ff62efaab9c __CxxCallCatchBlock 45 API calls 15736->15740 15741 7ff62efb2d5b 15740->15741 15743 7ff62efb2db2 15741->15743 15744 7ff62efab8e4 50 API calls 15741->15744 15743->15711 15745 7ff62efb2d9c 15744->15745 15746 7ff62efb2a34 65 API calls 15745->15746 15746->15743 15781 7ff62efa5098 15747->15781 15750 7ff62efb2754 GetOEMCP 15753 7ff62efb277b 15750->15753 15751 7ff62efb2766 15752 7ff62efb276b GetACP 15751->15752 15751->15753 15752->15753 15753->15714 15753->15730 15755 7ff62efb2734 47 API calls 15754->15755 15756 7ff62efb2e09 15755->15756 15757 7ff62efb2f5f 15756->15757 15759 7ff62efb2e46 IsValidCodePage 15756->15759 15764 7ff62efb2e60 __scrt_get_show_window_mode 15756->15764 15758 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 15757->15758 15760 7ff62efb2ba1 15758->15760 15759->15757 15761 7ff62efb2e57 15759->15761 15760->15721 15760->15725 15762 7ff62efb2e86 GetCPInfo 15761->15762 15761->15764 15762->15757 15762->15764 15813 7ff62efb284c 15764->15813 15899 7ff62efb0db8 EnterCriticalSection 15765->15899 15782 7ff62efa50b7 15781->15782 15783 7ff62efa50bc 15781->15783 15782->15750 15782->15751 15783->15782 15784 7ff62efab810 __CxxCallCatchBlock 45 API calls 15783->15784 15785 7ff62efa50d7 15784->15785 15789 7ff62efae044 15785->15789 15790 7ff62efa50fa 15789->15790 15791 7ff62efae059 15789->15791 15793 7ff62efae0b0 15790->15793 15791->15790 15797 7ff62efb3a74 15791->15797 15794 7ff62efae0c5 15793->15794 15795 7ff62efae0d8 15793->15795 15794->15795 15810 7ff62efb2dc0 15794->15810 15795->15782 15798 7ff62efab810 __CxxCallCatchBlock 45 API calls 15797->15798 15799 7ff62efb3a83 15798->15799 15801 7ff62efb3ace 15799->15801 15809 7ff62efb0db8 EnterCriticalSection 15799->15809 15801->15790 15811 7ff62efab810 __CxxCallCatchBlock 45 API calls 15810->15811 15812 7ff62efb2dc9 15811->15812 15814 7ff62efb2889 GetCPInfo 15813->15814 15823 7ff62efb297f 15813->15823 15819 7ff62efb289c 15814->15819 15814->15823 15815 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 15817 7ff62efb2a1e 15815->15817 15817->15757 15824 7ff62efb35b0 15819->15824 15823->15815 15825 7ff62efa5098 45 API calls 15824->15825 15826 7ff62efb35f2 15825->15826 15844 7ff62efafd00 15826->15844 15846 7ff62efafd09 MultiByteToWideChar 15844->15846 15904 7ff62efa9b3d 15900->15904 15905 7ff62efa99d9 15900->15905 15901 7ff62efa9b66 15903 7ff62efab00c __free_lconv_mon 11 API calls 15901->15903 15902 7ff62efab00c __free_lconv_mon 11 API calls 15902->15904 15903->15905 15904->15901 15904->15902 15905->15683 15907 7ff62efb6d30 15906->15907 15908 7ff62efb6d19 15906->15908 15907->15908 15911 7ff62efb6d3e 15907->15911 15909 7ff62efa55c4 _get_daylight 11 API calls 15908->15909 15910 7ff62efb6d1e 15909->15910 15912 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 15910->15912 15913 7ff62efa5098 45 API calls 15911->15913 15914 7ff62efb6d29 15911->15914 15912->15914 15913->15914 15914->15439 15916 7ff62efa5098 45 API calls 15915->15916 15917 7ff62efb9949 15916->15917 15920 7ff62efb95a0 15917->15920 15922 7ff62efb95ee 15920->15922 15921 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 15923 7ff62efb7bd5 15921->15923 15925 7ff62efb9660 GetCPInfo 15922->15925 15926 7ff62efb9675 15922->15926 15930 7ff62efb9679 15922->15930 15923->15439 15923->15464 15924 7ff62efafd00 _fread_nolock MultiByteToWideChar 15927 7ff62efb970d 15924->15927 15925->15926 15925->15930 15926->15924 15926->15930 15928 7ff62efadcbc _fread_nolock 12 API calls 15927->15928 15929 7ff62efb9744 15927->15929 15927->15930 15928->15929 15929->15930 15931 7ff62efafd00 _fread_nolock MultiByteToWideChar 15929->15931 15930->15921 15932 7ff62efb97b2 15931->15932 15933 7ff62efb9894 15932->15933 15934 7ff62efafd00 _fread_nolock MultiByteToWideChar 15932->15934 15933->15930 15935 7ff62efab00c __free_lconv_mon 11 API calls 15933->15935 15936 7ff62efb97d8 15934->15936 15935->15930 15936->15933 15937 7ff62efadcbc _fread_nolock 12 API calls 15936->15937 15938 7ff62efb9805 15936->15938 15937->15938 15938->15933 15939 7ff62efafd00 _fread_nolock MultiByteToWideChar 15938->15939 15940 7ff62efb987c 15939->15940 15941 7ff62efb9882 15940->15941 15942 7ff62efb989c 15940->15942 15941->15933 15944 7ff62efab00c __free_lconv_mon 11 API calls 15941->15944 15949 7ff62efaf528 15942->15949 15944->15933 15946 7ff62efb98db 15946->15930 15948 7ff62efab00c __free_lconv_mon 11 API calls 15946->15948 15947 7ff62efab00c __free_lconv_mon 11 API calls 15947->15946 15948->15930 15950 7ff62efaf2d0 __crtLCMapStringW 5 API calls 15949->15950 15951 7ff62efaf566 15950->15951 15952 7ff62efaf56e 15951->15952 15953 7ff62efaf790 __crtLCMapStringW 5 API calls 15951->15953 15952->15946 15952->15947 15954 7ff62efaf5d7 CompareStringW 15953->15954 15954->15952 15956 7ff62efb0fd1 15955->15956 15957 7ff62efb0fdb 15955->15957 15958 7ff62efadcbc _fread_nolock 12 API calls 15956->15958 15959 7ff62efb0fe0 15957->15959 15966 7ff62efb0fe7 _get_daylight 15957->15966 15964 7ff62efb0fd9 15958->15964 15960 7ff62efab00c __free_lconv_mon 11 API calls 15959->15960 15960->15964 15961 7ff62efb0fed 15963 7ff62efa55c4 _get_daylight 11 API calls 15961->15963 15962 7ff62efb101a RtlReAllocateHeap 15962->15964 15962->15966 15963->15964 15964->15473 15965 7ff62efb3d00 _get_daylight 2 API calls 15965->15966 15966->15961 15966->15962 15966->15965 15968 7ff62efb8611 15967->15968 15969 7ff62efb862a HeapSize 15967->15969 15970 7ff62efa55c4 _get_daylight 11 API calls 15968->15970 15971 7ff62efb8616 15970->15971 15972 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 15971->15972 15973 7ff62efb8621 15972->15973 15973->15469 15975 7ff62efaf2d0 __crtLCMapStringW 5 API calls 15974->15975 15976 7ff62efaf504 15975->15976 15976->15477 15978 7ff62efa56ae 15977->15978 15979 7ff62efa56d2 15977->15979 15983 7ff62efab00c __free_lconv_mon 11 API calls 15978->15983 15998 7ff62efa56bd 15978->15998 15980 7ff62efa572c 15979->15980 15981 7ff62efa56d7 15979->15981 15982 7ff62efafd00 _fread_nolock MultiByteToWideChar 15980->15982 15984 7ff62efa56ec 15981->15984 15985 7ff62efab00c __free_lconv_mon 11 API calls 15981->15985 15981->15998 15991 7ff62efa5748 15982->15991 15983->15998 15986 7ff62efadcbc _fread_nolock 12 API calls 15984->15986 15985->15984 15986->15998 15987 7ff62efa574f GetLastError 15999 7ff62efa5538 15987->15999 15988 7ff62efa578a 15992 7ff62efafd00 _fread_nolock MultiByteToWideChar 15988->15992 15988->15998 15990 7ff62efa577d 15995 7ff62efadcbc _fread_nolock 12 API calls 15990->15995 15991->15987 15991->15988 15991->15990 15994 7ff62efab00c __free_lconv_mon 11 API calls 15991->15994 15996 7ff62efa57ce 15992->15996 15994->15990 15995->15988 15996->15987 15996->15998 15997 7ff62efa55c4 _get_daylight 11 API calls 15997->15998 15998->15481 15998->15482 16000 7ff62efab988 _get_daylight 11 API calls 15999->16000 16001 7ff62efa5545 __free_lconv_mon 16000->16001 16002 7ff62efab988 _get_daylight 11 API calls 16001->16002 16003 7ff62efa5567 16002->16003 16003->15997 19329 7ff62efaa3e0 19332 7ff62efaa35c 19329->19332 19339 7ff62efb0db8 EnterCriticalSection 19332->19339 19340 7ff62efacbe0 19351 7ff62efb0db8 EnterCriticalSection 19340->19351 15260 7ff62ef9b5f0 15261 7ff62ef9b613 15260->15261 15262 7ff62ef9b62f memcpy_s 15260->15262 15263 7ff62efadcbc 12 API calls 15261->15263 15263->15262 19077 7ff62efbaa6e 19078 7ff62efbaa7e 19077->19078 19081 7ff62efa5478 LeaveCriticalSection 19078->19081 19470 7ff62efbabf4 19473 7ff62efa5478 LeaveCriticalSection 19470->19473 16004 7ff62efafdec 16005 7ff62efaffde 16004->16005 16007 7ff62efafe2e _isindst 16004->16007 16006 7ff62efa55c4 _get_daylight 11 API calls 16005->16006 16024 7ff62efaffce 16006->16024 16007->16005 16010 7ff62efafeae _isindst 16007->16010 16008 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 16009 7ff62efafff9 16008->16009 16025 7ff62efb6a04 16010->16025 16015 7ff62efb000a 16017 7ff62efaafc4 _wfindfirst32i64 17 API calls 16015->16017 16019 7ff62efb001e 16017->16019 16022 7ff62efaff0b 16022->16024 16050 7ff62efb6a48 16022->16050 16024->16008 16026 7ff62efafecc 16025->16026 16027 7ff62efb6a13 16025->16027 16032 7ff62efb5e08 16026->16032 16057 7ff62efb0db8 EnterCriticalSection 16027->16057 16033 7ff62efb5e11 16032->16033 16034 7ff62efafee1 16032->16034 16035 7ff62efa55c4 _get_daylight 11 API calls 16033->16035 16034->16015 16038 7ff62efb5e38 16034->16038 16036 7ff62efb5e16 16035->16036 16037 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 16036->16037 16037->16034 16039 7ff62efb5e41 16038->16039 16040 7ff62efafef2 16038->16040 16041 7ff62efa55c4 _get_daylight 11 API calls 16039->16041 16040->16015 16044 7ff62efb5e68 16040->16044 16042 7ff62efb5e46 16041->16042 16043 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 16042->16043 16043->16040 16045 7ff62efb5e71 16044->16045 16046 7ff62efaff03 16044->16046 16047 7ff62efa55c4 _get_daylight 11 API calls 16045->16047 16046->16015 16046->16022 16048 7ff62efb5e76 16047->16048 16049 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 16048->16049 16049->16046 16058 7ff62efb0db8 EnterCriticalSection 16050->16058 16059 7ff62ef9c17c 16080 7ff62ef9c34c 16059->16080 16062 7ff62ef9c2c8 16180 7ff62ef9c67c IsProcessorFeaturePresent 16062->16180 16063 7ff62ef9c198 __scrt_acquire_startup_lock 16065 7ff62ef9c2d2 16063->16065 16072 7ff62ef9c1b6 __scrt_release_startup_lock 16063->16072 16066 7ff62ef9c67c 7 API calls 16065->16066 16068 7ff62ef9c2dd __CxxCallCatchBlock 16066->16068 16067 7ff62ef9c1db 16069 7ff62ef9c261 16086 7ff62ef9c7c8 16069->16086 16071 7ff62ef9c266 16089 7ff62ef91000 16071->16089 16072->16067 16072->16069 16169 7ff62efaa1bc 16072->16169 16077 7ff62ef9c289 16077->16068 16176 7ff62ef9c4e0 16077->16176 16187 7ff62ef9c94c 16080->16187 16083 7ff62ef9c190 16083->16062 16083->16063 16084 7ff62ef9c37b __scrt_initialize_crt 16084->16083 16189 7ff62ef9da98 16084->16189 16216 7ff62ef9d1e0 16086->16216 16088 7ff62ef9c7df GetStartupInfoW 16088->16071 16090 7ff62ef9100b 16089->16090 16218 7ff62ef987b0 16090->16218 16092 7ff62ef9101d 16225 7ff62efa5ff8 16092->16225 16094 7ff62ef939cb 16232 7ff62ef91eb0 16094->16232 16098 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 16099 7ff62ef93b93 16098->16099 16174 7ff62ef9c80c GetModuleHandleW 16099->16174 16100 7ff62ef939ea 16128 7ff62ef93ad2 16100->16128 16248 7ff62ef97b70 16100->16248 16102 7ff62ef93a1f 16103 7ff62ef93a6b 16102->16103 16105 7ff62ef97b70 61 API calls 16102->16105 16263 7ff62ef98050 16103->16263 16110 7ff62ef93a40 __std_exception_destroy 16105->16110 16106 7ff62ef93a80 16267 7ff62ef91cb0 16106->16267 16109 7ff62ef93b4d 16112 7ff62ef93bad 16109->16112 16286 7ff62ef98980 16109->16286 16110->16103 16113 7ff62ef98050 58 API calls 16110->16113 16111 7ff62ef91cb0 121 API calls 16114 7ff62ef93ab6 16111->16114 16117 7ff62ef93bfb 16112->16117 16112->16128 16310 7ff62ef98be0 16112->16310 16113->16103 16115 7ff62ef93ad7 16114->16115 16116 7ff62ef93aba 16114->16116 16115->16109 16379 7ff62ef93fe0 16115->16379 16366 7ff62ef92b30 16116->16366 16324 7ff62ef96df0 16117->16324 16120 7ff62ef93be0 16125 7ff62ef93bee SetDllDirectoryW 16120->16125 16126 7ff62ef93b73 16120->16126 16125->16117 16132 7ff62ef92b30 59 API calls 16126->16132 16128->16098 16131 7ff62ef93af5 16138 7ff62ef92b30 59 API calls 16131->16138 16132->16128 16135 7ff62ef93c15 16160 7ff62ef93c47 16135->16160 16411 7ff62ef96600 16135->16411 16136 7ff62ef93b23 16136->16109 16139 7ff62ef93b28 16136->16139 16137 7ff62ef93d06 16328 7ff62ef934c0 16137->16328 16138->16128 16398 7ff62efa028c 16139->16398 16145 7ff62ef93c66 16152 7ff62ef93ca8 16145->16152 16453 7ff62ef91ef0 16145->16453 16146 7ff62ef93c49 16447 7ff62ef96850 16146->16447 16151 7ff62ef93d20 16336 7ff62ef97fe0 16151->16336 16152->16128 16457 7ff62ef93460 16152->16457 16156 7ff62ef93c38 16441 7ff62ef96c40 16156->16441 16158 7ff62ef93d33 16161 7ff62ef97b70 61 API calls 16158->16161 16159 7ff62ef93ce1 16163 7ff62ef96850 FreeLibrary 16159->16163 16160->16137 16160->16145 16162 7ff62ef93d3f 16161->16162 16343 7ff62ef98090 16162->16343 16163->16128 16170 7ff62efaa1f4 16169->16170 16171 7ff62efaa1d3 16169->16171 18853 7ff62efaaa68 16170->18853 16171->16069 16175 7ff62ef9c81d 16174->16175 16175->16077 16178 7ff62ef9c4f1 16176->16178 16177 7ff62ef9c2a0 16177->16067 16178->16177 16179 7ff62ef9da98 __scrt_initialize_crt 7 API calls 16178->16179 16179->16177 16181 7ff62ef9c6a2 _wfindfirst32i64 __scrt_get_show_window_mode 16180->16181 16182 7ff62ef9c6c1 RtlCaptureContext RtlLookupFunctionEntry 16181->16182 16183 7ff62ef9c726 __scrt_get_show_window_mode 16182->16183 16184 7ff62ef9c6ea RtlVirtualUnwind 16182->16184 16185 7ff62ef9c758 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16183->16185 16184->16183 16186 7ff62ef9c7aa _wfindfirst32i64 16185->16186 16186->16065 16188 7ff62ef9c36e __scrt_dllmain_crt_thread_attach 16187->16188 16188->16083 16188->16084 16190 7ff62ef9daa0 16189->16190 16191 7ff62ef9daaa 16189->16191 16195 7ff62ef9de14 16190->16195 16191->16083 16196 7ff62ef9de23 16195->16196 16198 7ff62ef9daa5 16195->16198 16203 7ff62ef9e050 16196->16203 16199 7ff62ef9de80 16198->16199 16200 7ff62ef9deab 16199->16200 16201 7ff62ef9deaf 16200->16201 16202 7ff62ef9de8e DeleteCriticalSection 16200->16202 16201->16191 16202->16200 16207 7ff62ef9deb8 16203->16207 16208 7ff62ef9dfd2 TlsFree 16207->16208 16213 7ff62ef9defc __vcrt_InitializeCriticalSectionEx 16207->16213 16209 7ff62ef9df2a LoadLibraryExW 16211 7ff62ef9dfa1 16209->16211 16212 7ff62ef9df4b GetLastError 16209->16212 16210 7ff62ef9dfc1 GetProcAddress 16210->16208 16211->16210 16214 7ff62ef9dfb8 FreeLibrary 16211->16214 16212->16213 16213->16208 16213->16209 16213->16210 16215 7ff62ef9df6d LoadLibraryExW 16213->16215 16214->16210 16215->16211 16215->16213 16217 7ff62ef9d1c0 16216->16217 16217->16088 16217->16217 16219 7ff62ef987cf 16218->16219 16220 7ff62ef98820 WideCharToMultiByte 16219->16220 16221 7ff62ef987d7 __std_exception_destroy 16219->16221 16223 7ff62ef988c6 16219->16223 16224 7ff62ef98874 WideCharToMultiByte 16219->16224 16220->16219 16220->16223 16221->16092 16505 7ff62ef929e0 16223->16505 16224->16219 16224->16223 16226 7ff62efb0150 16225->16226 16228 7ff62efb01f6 16226->16228 16229 7ff62efb01a3 16226->16229 16227 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 16231 7ff62efb01cc 16227->16231 16836 7ff62efb0028 16228->16836 16229->16227 16231->16094 16233 7ff62ef91ec5 16232->16233 16234 7ff62ef91ee0 16233->16234 16844 7ff62ef92890 16233->16844 16234->16128 16236 7ff62ef93ed0 16234->16236 16237 7ff62ef9bd60 16236->16237 16238 7ff62ef93edc GetModuleFileNameW 16237->16238 16239 7ff62ef93f22 16238->16239 16240 7ff62ef93f0b 16238->16240 16884 7ff62ef98cf0 16239->16884 16241 7ff62ef929e0 57 API calls 16240->16241 16243 7ff62ef93f1e 16241->16243 16246 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 16243->16246 16245 7ff62ef92b30 59 API calls 16245->16243 16247 7ff62ef93f5f 16246->16247 16247->16100 16249 7ff62ef97b7a 16248->16249 16250 7ff62ef98be0 57 API calls 16249->16250 16251 7ff62ef97b9c GetEnvironmentVariableW 16250->16251 16252 7ff62ef97bb4 ExpandEnvironmentStringsW 16251->16252 16253 7ff62ef97c06 16251->16253 16255 7ff62ef98cf0 59 API calls 16252->16255 16254 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 16253->16254 16256 7ff62ef97c18 16254->16256 16257 7ff62ef97bdc 16255->16257 16256->16102 16257->16253 16258 7ff62ef97be6 16257->16258 16895 7ff62efaaa9c 16258->16895 16261 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 16262 7ff62ef97bfe 16261->16262 16262->16102 16264 7ff62ef98be0 57 API calls 16263->16264 16265 7ff62ef98067 SetEnvironmentVariableW 16264->16265 16266 7ff62ef9807f __std_exception_destroy 16265->16266 16266->16106 16268 7ff62ef91cbe 16267->16268 16269 7ff62ef91ef0 49 API calls 16268->16269 16270 7ff62ef91cf4 16269->16270 16271 7ff62ef91dde 16270->16271 16272 7ff62ef91ef0 49 API calls 16270->16272 16273 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 16271->16273 16274 7ff62ef91d1a 16272->16274 16275 7ff62ef91e6c 16273->16275 16274->16271 16902 7ff62ef91aa0 16274->16902 16275->16109 16275->16111 16279 7ff62ef91dcc 16280 7ff62ef93e50 49 API calls 16279->16280 16280->16271 16281 7ff62ef91d8f 16281->16279 16282 7ff62ef91e34 16281->16282 16283 7ff62ef93e50 49 API calls 16282->16283 16284 7ff62ef91e41 16283->16284 16938 7ff62ef94060 16284->16938 16287 7ff62ef98995 16286->16287 16980 7ff62ef98660 GetCurrentProcess OpenProcessToken 16287->16980 16290 7ff62ef98660 7 API calls 16291 7ff62ef989c1 16290->16291 16292 7ff62ef989f4 16291->16292 16293 7ff62ef989da 16291->16293 16295 7ff62ef98750 48 API calls 16292->16295 16990 7ff62ef98750 16293->16990 16297 7ff62ef98a07 LocalFree LocalFree 16295->16297 16298 7ff62ef98a23 16297->16298 16300 7ff62ef98a2f 16297->16300 16994 7ff62ef92c50 16298->16994 16301 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 16300->16301 16302 7ff62ef93b6e 16301->16302 16302->16126 16303 7ff62ef914f0 16302->16303 16304 7ff62ef91506 16303->16304 16307 7ff62ef9157f 16303->16307 17198 7ff62ef97960 16304->17198 16307->16112 16308 7ff62ef92b30 59 API calls 16309 7ff62ef91564 16308->16309 16309->16112 16311 7ff62ef98c01 MultiByteToWideChar 16310->16311 16312 7ff62ef98c87 MultiByteToWideChar 16310->16312 16315 7ff62ef98c27 16311->16315 16316 7ff62ef98c4c 16311->16316 16313 7ff62ef98ccf 16312->16313 16314 7ff62ef98caa 16312->16314 16313->16120 16317 7ff62ef929e0 55 API calls 16314->16317 16318 7ff62ef929e0 55 API calls 16315->16318 16316->16312 16321 7ff62ef98c62 16316->16321 16319 7ff62ef98cbd 16317->16319 16320 7ff62ef98c3a 16318->16320 16319->16120 16320->16120 16322 7ff62ef929e0 55 API calls 16321->16322 16323 7ff62ef98c75 16322->16323 16323->16120 16325 7ff62ef96e05 16324->16325 16326 7ff62ef92890 59 API calls 16325->16326 16327 7ff62ef93c00 16325->16327 16326->16327 16327->16160 16402 7ff62ef96aa0 16327->16402 16332 7ff62ef93533 16328->16332 16334 7ff62ef93574 16328->16334 16329 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 16330 7ff62ef935c5 16329->16330 16330->16128 16335 7ff62ef98950 LocalFree 16330->16335 16332->16334 17525 7ff62ef91710 16332->17525 17567 7ff62ef92d70 16332->17567 16334->16329 16335->16151 16337 7ff62ef98be0 57 API calls 16336->16337 16338 7ff62ef97fff 16337->16338 16339 7ff62ef98be0 57 API calls 16338->16339 16340 7ff62ef9800f 16339->16340 16341 7ff62efa7eec 38 API calls 16340->16341 16342 7ff62ef9801d __std_exception_destroy 16341->16342 16342->16158 16344 7ff62ef980a0 16343->16344 16345 7ff62ef98be0 57 API calls 16344->16345 16346 7ff62ef980d1 SetConsoleCtrlHandler GetStartupInfoW 16345->16346 16347 7ff62ef98132 16346->16347 17993 7ff62efaab14 16347->17993 16367 7ff62ef92b50 16366->16367 16368 7ff62efa4bc4 49 API calls 16367->16368 16369 7ff62ef92b9b __scrt_get_show_window_mode 16368->16369 16370 7ff62ef98be0 57 API calls 16369->16370 16371 7ff62ef92bd0 16370->16371 16372 7ff62ef92bd5 16371->16372 16373 7ff62ef92c0d MessageBoxA 16371->16373 16374 7ff62ef98be0 57 API calls 16372->16374 16375 7ff62ef92c27 16373->16375 16376 7ff62ef92bef MessageBoxW 16374->16376 16377 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 16375->16377 16376->16375 16378 7ff62ef92c37 16377->16378 16378->16128 16380 7ff62ef93fec 16379->16380 16381 7ff62ef98be0 57 API calls 16380->16381 16382 7ff62ef94017 16381->16382 16383 7ff62ef98be0 57 API calls 16382->16383 16384 7ff62ef9402a 16383->16384 18011 7ff62efa65a8 16384->18011 16387 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 16388 7ff62ef93aed 16387->16388 16388->16131 16389 7ff62ef982c0 16388->16389 16390 7ff62ef982e4 16389->16390 16391 7ff62ef983bb __std_exception_destroy 16390->16391 16392 7ff62efa0914 73 API calls 16390->16392 16391->16136 16393 7ff62ef982fe 16392->16393 16393->16391 18390 7ff62efa9170 16393->18390 16395 7ff62ef98313 16395->16391 16396 7ff62efa0914 73 API calls 16395->16396 16397 7ff62efa05dc _fread_nolock 53 API calls 16395->16397 16396->16395 16397->16395 16399 7ff62efa02bc 16398->16399 18405 7ff62efa0068 16399->18405 16401 7ff62efa02d5 16401->16131 16403 7ff62ef96ac3 16402->16403 16404 7ff62ef96ada 16402->16404 16403->16404 18416 7ff62ef915a0 16403->18416 16404->16135 16406 7ff62ef96ae4 16406->16404 16407 7ff62ef94060 49 API calls 16406->16407 16408 7ff62ef96b45 16407->16408 16409 7ff62ef92b30 59 API calls 16408->16409 16410 7ff62ef96bb5 memcpy_s __std_exception_destroy 16408->16410 16409->16404 16410->16135 16417 7ff62ef9661a memcpy_s 16411->16417 16412 7ff62ef9673f 16415 7ff62ef94060 49 API calls 16412->16415 16414 7ff62ef9675b 16416 7ff62ef92b30 59 API calls 16414->16416 16418 7ff62ef967b8 16415->16418 16422 7ff62ef96751 __std_exception_destroy 16416->16422 16417->16412 16417->16414 16417->16417 16419 7ff62ef94060 49 API calls 16417->16419 16420 7ff62ef96720 16417->16420 16428 7ff62ef91710 135 API calls 16417->16428 16429 7ff62ef96741 16417->16429 18440 7ff62ef91950 16417->18440 16421 7ff62ef94060 49 API calls 16418->16421 16419->16417 16420->16412 16423 7ff62ef94060 49 API calls 16420->16423 16424 7ff62ef967e8 16421->16424 16425 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 16422->16425 16423->16412 16427 7ff62ef94060 49 API calls 16424->16427 16426 7ff62ef93c26 16425->16426 16426->16146 16431 7ff62ef96580 16426->16431 16427->16422 16428->16417 16430 7ff62ef92b30 59 API calls 16429->16430 16430->16422 18444 7ff62ef98270 16431->18444 16433 7ff62ef9659c 16434 7ff62ef98270 58 API calls 16433->16434 16435 7ff62ef965af 16434->16435 16436 7ff62ef965e5 16435->16436 16437 7ff62ef965c7 16435->16437 16438 7ff62ef92b30 59 API calls 16436->16438 18448 7ff62ef96f00 GetProcAddress 16437->18448 16440 7ff62ef93c34 16438->16440 16440->16146 16440->16156 16442 7ff62ef96c64 16441->16442 16443 7ff62ef92b30 59 API calls 16442->16443 16446 7ff62ef96cda 16442->16446 16444 7ff62ef96cbe 16443->16444 16446->16160 16450 7ff62ef9688d 16447->16450 16452 7ff62ef96862 16447->16452 16449 7ff62ef9694b 16449->16450 18508 7ff62ef98250 FreeLibrary 16449->18508 16450->16160 16452->16449 16452->16450 18507 7ff62ef98250 FreeLibrary 16452->18507 16454 7ff62ef91f15 16453->16454 16455 7ff62efa4bc4 49 API calls 16454->16455 16456 7ff62ef91f38 16455->16456 16456->16152 18509 7ff62ef95bd0 16457->18509 16460 7ff62ef934ad 16460->16159 16462 7ff62ef93484 16462->16460 18578 7ff62ef95930 16462->18578 16524 7ff62ef9bd60 16505->16524 16508 7ff62ef92a29 16526 7ff62efa4bc4 16508->16526 16513 7ff62ef91ef0 49 API calls 16514 7ff62ef92a86 __scrt_get_show_window_mode 16513->16514 16515 7ff62ef98be0 54 API calls 16514->16515 16516 7ff62ef92abb 16515->16516 16517 7ff62ef92ac0 16516->16517 16518 7ff62ef92af8 MessageBoxA 16516->16518 16519 7ff62ef98be0 54 API calls 16517->16519 16520 7ff62ef92b12 16518->16520 16521 7ff62ef92ada MessageBoxW 16519->16521 16522 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 16520->16522 16521->16520 16523 7ff62ef92b22 16522->16523 16523->16221 16525 7ff62ef929fc GetLastError 16524->16525 16525->16508 16529 7ff62efa4c1e 16526->16529 16527 7ff62efa4c43 16530 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 16527->16530 16528 7ff62efa4c7f 16556 7ff62efa2e50 16528->16556 16529->16527 16529->16528 16532 7ff62efa4c6d 16530->16532 16535 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 16532->16535 16533 7ff62efa4d5c 16534 7ff62efab00c __free_lconv_mon 11 API calls 16533->16534 16534->16532 16537 7ff62ef92a57 16535->16537 16544 7ff62ef98570 16537->16544 16538 7ff62efa4d31 16542 7ff62efab00c __free_lconv_mon 11 API calls 16538->16542 16539 7ff62efa4d80 16539->16533 16541 7ff62efa4d8a 16539->16541 16540 7ff62efa4d28 16540->16533 16540->16538 16543 7ff62efab00c __free_lconv_mon 11 API calls 16541->16543 16542->16532 16543->16532 16545 7ff62ef9857c 16544->16545 16546 7ff62ef98597 GetLastError 16545->16546 16547 7ff62ef9859d FormatMessageW 16545->16547 16546->16547 16548 7ff62ef985d0 16547->16548 16549 7ff62ef985ec WideCharToMultiByte 16547->16549 16550 7ff62ef929e0 54 API calls 16548->16550 16551 7ff62ef985e3 16549->16551 16552 7ff62ef98626 16549->16552 16550->16551 16554 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 16551->16554 16553 7ff62ef929e0 54 API calls 16552->16553 16553->16551 16555 7ff62ef92a5e 16554->16555 16555->16513 16557 7ff62efa2e8e 16556->16557 16558 7ff62efa2e7e 16556->16558 16559 7ff62efa2e97 16557->16559 16566 7ff62efa2ec5 16557->16566 16562 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 16558->16562 16560 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 16559->16560 16561 7ff62efa2ebd 16560->16561 16561->16533 16561->16538 16561->16539 16561->16540 16562->16561 16565 7ff62efa3174 16568 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 16565->16568 16566->16558 16566->16561 16566->16565 16570 7ff62efa37e0 16566->16570 16596 7ff62efa34a8 16566->16596 16626 7ff62efa2d30 16566->16626 16629 7ff62efa4a00 16566->16629 16568->16558 16571 7ff62efa3822 16570->16571 16572 7ff62efa3895 16570->16572 16573 7ff62efa38bf 16571->16573 16574 7ff62efa3828 16571->16574 16575 7ff62efa38ef 16572->16575 16576 7ff62efa389a 16572->16576 16653 7ff62efa1d90 16573->16653 16581 7ff62efa382d 16574->16581 16587 7ff62efa38fe 16574->16587 16575->16573 16575->16587 16594 7ff62efa3858 16575->16594 16577 7ff62efa38cf 16576->16577 16578 7ff62efa389c 16576->16578 16660 7ff62efa1980 16577->16660 16580 7ff62efa383d 16578->16580 16586 7ff62efa38ab 16578->16586 16595 7ff62efa392d 16580->16595 16635 7ff62efa4144 16580->16635 16581->16580 16584 7ff62efa3870 16581->16584 16581->16594 16584->16595 16645 7ff62efa4600 16584->16645 16586->16573 16589 7ff62efa38b0 16586->16589 16587->16595 16667 7ff62efa21a0 16587->16667 16589->16595 16649 7ff62efa4798 16589->16649 16590 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 16592 7ff62efa3bc3 16590->16592 16592->16566 16594->16595 16674 7ff62efaef18 16594->16674 16595->16590 16597 7ff62efa34b3 16596->16597 16598 7ff62efa34c9 16596->16598 16599 7ff62efa3822 16597->16599 16600 7ff62efa3895 16597->16600 16614 7ff62efa3507 16597->16614 16601 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 16598->16601 16598->16614 16602 7ff62efa38bf 16599->16602 16603 7ff62efa3828 16599->16603 16604 7ff62efa389a 16600->16604 16610 7ff62efa38ef 16600->16610 16601->16614 16606 7ff62efa1d90 38 API calls 16602->16606 16607 7ff62efa38fe 16603->16607 16611 7ff62efa382d 16603->16611 16605 7ff62efa38cf 16604->16605 16608 7ff62efa389c 16604->16608 16612 7ff62efa1980 38 API calls 16605->16612 16624 7ff62efa3858 16606->16624 16616 7ff62efa21a0 38 API calls 16607->16616 16625 7ff62efa392d 16607->16625 16609 7ff62efa383d 16608->16609 16617 7ff62efa38ab 16608->16617 16613 7ff62efa4144 47 API calls 16609->16613 16609->16625 16610->16602 16610->16607 16610->16624 16611->16609 16615 7ff62efa3870 16611->16615 16611->16624 16612->16624 16613->16624 16614->16566 16618 7ff62efa4600 47 API calls 16615->16618 16615->16625 16616->16624 16617->16602 16619 7ff62efa38b0 16617->16619 16618->16624 16621 7ff62efa4798 37 API calls 16619->16621 16619->16625 16620 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 16622 7ff62efa3bc3 16620->16622 16621->16624 16622->16566 16623 7ff62efaef18 47 API calls 16623->16624 16624->16623 16624->16625 16625->16620 16811 7ff62efa0f54 16626->16811 16630 7ff62efa4a17 16629->16630 16828 7ff62efae078 16630->16828 16636 7ff62efa4166 16635->16636 16684 7ff62efa0dc0 16636->16684 16641 7ff62efa4a00 45 API calls 16642 7ff62efa42a3 16641->16642 16643 7ff62efa4a00 45 API calls 16642->16643 16644 7ff62efa432c 16642->16644 16643->16644 16644->16594 16646 7ff62efa4680 16645->16646 16647 7ff62efa4618 16645->16647 16646->16594 16647->16646 16648 7ff62efaef18 47 API calls 16647->16648 16648->16646 16652 7ff62efa47b9 16649->16652 16650 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 16651 7ff62efa47ea 16650->16651 16651->16594 16652->16650 16652->16651 16654 7ff62efa1dc3 16653->16654 16655 7ff62efa1df2 16654->16655 16657 7ff62efa1eaf 16654->16657 16656 7ff62efa0dc0 12 API calls 16655->16656 16659 7ff62efa1e2f 16655->16659 16656->16659 16658 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 16657->16658 16658->16659 16659->16594 16662 7ff62efa19b3 16660->16662 16661 7ff62efa19e2 16663 7ff62efa0dc0 12 API calls 16661->16663 16666 7ff62efa1a1f 16661->16666 16662->16661 16664 7ff62efa1a9f 16662->16664 16663->16666 16665 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 16664->16665 16665->16666 16666->16594 16668 7ff62efa21d3 16667->16668 16669 7ff62efa2202 16668->16669 16671 7ff62efa22bf 16668->16671 16670 7ff62efa0dc0 12 API calls 16669->16670 16673 7ff62efa223f 16669->16673 16670->16673 16672 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 16671->16672 16672->16673 16673->16594 16675 7ff62efaef40 16674->16675 16676 7ff62efaef85 16675->16676 16677 7ff62efa4a00 45 API calls 16675->16677 16679 7ff62efaef6e __scrt_get_show_window_mode 16675->16679 16682 7ff62efaef45 __scrt_get_show_window_mode 16675->16682 16676->16679 16680 7ff62efb05c8 WideCharToMultiByte 16676->16680 16676->16682 16677->16676 16678 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 16678->16682 16679->16678 16679->16682 16681 7ff62efaf061 16680->16681 16681->16682 16683 7ff62efaf076 GetLastError 16681->16683 16682->16594 16683->16679 16683->16682 16685 7ff62efa0df7 16684->16685 16686 7ff62efa0de6 16684->16686 16685->16686 16687 7ff62efadcbc _fread_nolock 12 API calls 16685->16687 16692 7ff62efaec30 16686->16692 16688 7ff62efa0e24 16687->16688 16689 7ff62efa0e38 16688->16689 16690 7ff62efab00c __free_lconv_mon 11 API calls 16688->16690 16691 7ff62efab00c __free_lconv_mon 11 API calls 16689->16691 16690->16689 16691->16686 16693 7ff62efaec80 16692->16693 16694 7ff62efaec4d 16692->16694 16693->16694 16696 7ff62efaecb2 16693->16696 16695 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 16694->16695 16705 7ff62efa4281 16695->16705 16701 7ff62efaedc5 16696->16701 16707 7ff62efaecfa 16696->16707 16697 7ff62efaeeb7 16738 7ff62efae11c 16697->16738 16699 7ff62efaee7d 16731 7ff62efae4b4 16699->16731 16701->16697 16701->16699 16702 7ff62efaee4c 16701->16702 16704 7ff62efaee0f 16701->16704 16706 7ff62efaee05 16701->16706 16724 7ff62efae794 16702->16724 16714 7ff62efae9c4 16704->16714 16705->16641 16705->16642 16706->16699 16709 7ff62efaee0a 16706->16709 16707->16705 16710 7ff62efaab3c __std_exception_copy 37 API calls 16707->16710 16709->16702 16709->16704 16711 7ff62efaedb2 16710->16711 16711->16705 16712 7ff62efaafc4 _wfindfirst32i64 17 API calls 16711->16712 16713 7ff62efaef14 16712->16713 16747 7ff62efb481c 16714->16747 16718 7ff62efaea6c 16719 7ff62efaeac1 16718->16719 16721 7ff62efaea8c 16718->16721 16723 7ff62efaea70 16718->16723 16800 7ff62efae5b0 16719->16800 16796 7ff62efae86c 16721->16796 16723->16705 16725 7ff62efb481c 38 API calls 16724->16725 16726 7ff62efae7de 16725->16726 16727 7ff62efb4264 37 API calls 16726->16727 16728 7ff62efae82e 16727->16728 16729 7ff62efae832 16728->16729 16730 7ff62efae86c 45 API calls 16728->16730 16729->16705 16730->16729 16732 7ff62efb481c 38 API calls 16731->16732 16733 7ff62efae4ff 16732->16733 16734 7ff62efb4264 37 API calls 16733->16734 16735 7ff62efae557 16734->16735 16736 7ff62efae55b 16735->16736 16737 7ff62efae5b0 45 API calls 16735->16737 16736->16705 16737->16736 16739 7ff62efae161 16738->16739 16740 7ff62efae194 16738->16740 16741 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 16739->16741 16742 7ff62efae1ac 16740->16742 16744 7ff62efae22d 16740->16744 16746 7ff62efae18d __scrt_get_show_window_mode 16741->16746 16743 7ff62efae4b4 46 API calls 16742->16743 16743->16746 16745 7ff62efa4a00 45 API calls 16744->16745 16744->16746 16745->16746 16746->16705 16748 7ff62efb486f fegetenv 16747->16748 16749 7ff62efb877c 37 API calls 16748->16749 16755 7ff62efb48c2 16749->16755 16750 7ff62efb48dd 16751 7ff62efb49b2 16750->16751 16761 7ff62efb48ef 16750->16761 16752 7ff62efb877c 37 API calls 16751->16752 16753 7ff62efb49dc 16752->16753 16757 7ff62efb877c 37 API calls 16753->16757 16754 7ff62efaab3c __std_exception_copy 37 API calls 16764 7ff62efb496d 16754->16764 16755->16750 16755->16751 16756 7ff62efb498c 16755->16756 16760 7ff62efaab3c __std_exception_copy 37 API calls 16756->16760 16758 7ff62efb49ed 16757->16758 16762 7ff62efb8970 20 API calls 16758->16762 16759 7ff62efb5a94 16763 7ff62efaafc4 _wfindfirst32i64 17 API calls 16759->16763 16760->16764 16761->16754 16774 7ff62efb4a56 __scrt_get_show_window_mode 16762->16774 16765 7ff62efb5aa9 16763->16765 16764->16759 16766 7ff62efb4975 16764->16766 16767 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 16766->16767 16768 7ff62efaea11 16767->16768 16792 7ff62efb4264 16768->16792 16769 7ff62efb4dff __scrt_get_show_window_mode 16770 7ff62efb513f 16771 7ff62efb4380 37 API calls 16770->16771 16778 7ff62efb5857 16771->16778 16772 7ff62efb50eb 16772->16770 16775 7ff62efb5aac memcpy_s 37 API calls 16772->16775 16773 7ff62efb4a97 memcpy_s 16786 7ff62efb53db memcpy_s __scrt_get_show_window_mode 16773->16786 16787 7ff62efb4ef3 memcpy_s __scrt_get_show_window_mode 16773->16787 16774->16769 16774->16773 16776 7ff62efa55c4 _get_daylight 11 API calls 16774->16776 16775->16770 16777 7ff62efb4ed0 16776->16777 16779 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 16777->16779 16781 7ff62efb5aac memcpy_s 37 API calls 16778->16781 16785 7ff62efb58b2 16778->16785 16779->16773 16780 7ff62efb5a38 16782 7ff62efb877c 37 API calls 16780->16782 16781->16785 16782->16766 16783 7ff62efa55c4 11 API calls _get_daylight 16783->16786 16784 7ff62efa55c4 11 API calls _get_daylight 16784->16787 16785->16780 16788 7ff62efb4380 37 API calls 16785->16788 16791 7ff62efb5aac memcpy_s 37 API calls 16785->16791 16786->16770 16786->16772 16786->16783 16789 7ff62efaafa4 37 API calls _invalid_parameter_noinfo 16786->16789 16787->16772 16787->16784 16790 7ff62efaafa4 37 API calls _invalid_parameter_noinfo 16787->16790 16788->16785 16789->16786 16790->16787 16791->16785 16793 7ff62efb4283 16792->16793 16794 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 16793->16794 16795 7ff62efb42ae memcpy_s 16793->16795 16794->16795 16795->16718 16797 7ff62efae898 memcpy_s 16796->16797 16798 7ff62efa4a00 45 API calls 16797->16798 16799 7ff62efae952 memcpy_s __scrt_get_show_window_mode 16797->16799 16798->16799 16799->16723 16801 7ff62efae5eb 16800->16801 16806 7ff62efae638 memcpy_s 16800->16806 16802 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 16801->16802 16803 7ff62efae617 16802->16803 16803->16723 16804 7ff62efae6a3 16805 7ff62efaab3c __std_exception_copy 37 API calls 16804->16805 16810 7ff62efae6e5 memcpy_s 16805->16810 16806->16804 16807 7ff62efa4a00 45 API calls 16806->16807 16807->16804 16808 7ff62efaafc4 _wfindfirst32i64 17 API calls 16809 7ff62efae790 16808->16809 16810->16808 16812 7ff62efa0f81 16811->16812 16813 7ff62efa0f93 16811->16813 16814 7ff62efa55c4 _get_daylight 11 API calls 16812->16814 16816 7ff62efa0fa0 16813->16816 16819 7ff62efa0fdd 16813->16819 16815 7ff62efa0f86 16814->16815 16817 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 16815->16817 16818 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 16816->16818 16825 7ff62efa0f91 16817->16825 16818->16825 16820 7ff62efa1086 16819->16820 16821 7ff62efa55c4 _get_daylight 11 API calls 16819->16821 16822 7ff62efa55c4 _get_daylight 11 API calls 16820->16822 16820->16825 16823 7ff62efa107b 16821->16823 16824 7ff62efa1130 16822->16824 16826 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 16823->16826 16827 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 16824->16827 16825->16566 16826->16820 16827->16825 16829 7ff62efae091 16828->16829 16830 7ff62efa4a3f 16828->16830 16829->16830 16831 7ff62efb3a74 45 API calls 16829->16831 16832 7ff62efae0e4 16830->16832 16831->16830 16833 7ff62efae0fd 16832->16833 16835 7ff62efa4a4f 16832->16835 16834 7ff62efb2dc0 45 API calls 16833->16834 16833->16835 16834->16835 16835->16566 16843 7ff62efa546c EnterCriticalSection 16836->16843 16845 7ff62ef928ac 16844->16845 16846 7ff62efa4bc4 49 API calls 16845->16846 16847 7ff62ef928fd 16846->16847 16848 7ff62efa55c4 _get_daylight 11 API calls 16847->16848 16849 7ff62ef92902 16848->16849 16863 7ff62efa55e4 16849->16863 16852 7ff62ef91ef0 49 API calls 16853 7ff62ef92931 __scrt_get_show_window_mode 16852->16853 16854 7ff62ef98be0 57 API calls 16853->16854 16855 7ff62ef92966 16854->16855 16856 7ff62ef929a3 MessageBoxA 16855->16856 16857 7ff62ef9296b 16855->16857 16858 7ff62ef929bd 16856->16858 16859 7ff62ef98be0 57 API calls 16857->16859 16860 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 16858->16860 16861 7ff62ef92985 MessageBoxW 16859->16861 16862 7ff62ef929cd 16860->16862 16861->16858 16862->16234 16864 7ff62efab988 _get_daylight 11 API calls 16863->16864 16865 7ff62efa55fb 16864->16865 16866 7ff62ef92909 16865->16866 16867 7ff62efaf258 _get_daylight 11 API calls 16865->16867 16870 7ff62efa563b 16865->16870 16866->16852 16868 7ff62efa5630 16867->16868 16869 7ff62efab00c __free_lconv_mon 11 API calls 16868->16869 16869->16870 16870->16866 16875 7ff62efaf928 16870->16875 16873 7ff62efaafc4 _wfindfirst32i64 17 API calls 16874 7ff62efa5680 16873->16874 16880 7ff62efaf945 16875->16880 16876 7ff62efaf94a 16877 7ff62efa5661 16876->16877 16878 7ff62efa55c4 _get_daylight 11 API calls 16876->16878 16877->16866 16877->16873 16879 7ff62efaf954 16878->16879 16881 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 16879->16881 16880->16876 16880->16877 16882 7ff62efaf994 16880->16882 16881->16877 16882->16877 16883 7ff62efa55c4 _get_daylight 11 API calls 16882->16883 16883->16879 16885 7ff62ef98d82 WideCharToMultiByte 16884->16885 16886 7ff62ef98d14 WideCharToMultiByte 16884->16886 16887 7ff62ef98daf 16885->16887 16891 7ff62ef93f35 16885->16891 16888 7ff62ef98d3e 16886->16888 16892 7ff62ef98d55 16886->16892 16889 7ff62ef929e0 57 API calls 16887->16889 16890 7ff62ef929e0 57 API calls 16888->16890 16889->16891 16890->16891 16891->16243 16891->16245 16892->16885 16893 7ff62ef98d6b 16892->16893 16894 7ff62ef929e0 57 API calls 16893->16894 16894->16891 16896 7ff62efaaab3 16895->16896 16899 7ff62ef97bee 16895->16899 16897 7ff62efaab3c __std_exception_copy 37 API calls 16896->16897 16896->16899 16898 7ff62efaaae0 16897->16898 16898->16899 16900 7ff62efaafc4 _wfindfirst32i64 17 API calls 16898->16900 16899->16261 16901 7ff62efaab10 16900->16901 16903 7ff62ef93fe0 116 API calls 16902->16903 16904 7ff62ef91ad6 16903->16904 16905 7ff62ef91c84 16904->16905 16906 7ff62ef982c0 83 API calls 16904->16906 16907 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 16905->16907 16908 7ff62ef91b0e 16906->16908 16909 7ff62ef91c98 16907->16909 16934 7ff62ef91b3f 16908->16934 16941 7ff62efa0914 16908->16941 16909->16271 16935 7ff62ef93e50 16909->16935 16911 7ff62efa028c 74 API calls 16911->16905 16912 7ff62ef91b28 16913 7ff62ef91b44 16912->16913 16914 7ff62ef91b2c 16912->16914 16945 7ff62efa05dc 16913->16945 16915 7ff62ef92890 59 API calls 16914->16915 16915->16934 16918 7ff62ef91b5f 16921 7ff62ef92890 59 API calls 16918->16921 16919 7ff62ef91b77 16920 7ff62efa0914 73 API calls 16919->16920 16922 7ff62ef91bc4 16920->16922 16921->16934 16923 7ff62ef91bee 16922->16923 16924 7ff62ef91bd6 16922->16924 16926 7ff62efa05dc _fread_nolock 53 API calls 16923->16926 16925 7ff62ef92890 59 API calls 16924->16925 16925->16934 16927 7ff62ef91c03 16926->16927 16928 7ff62ef91c1e 16927->16928 16929 7ff62ef91c09 16927->16929 16948 7ff62efa0350 16928->16948 16931 7ff62ef92890 59 API calls 16929->16931 16931->16934 16933 7ff62ef92b30 59 API calls 16933->16934 16934->16911 16936 7ff62ef91ef0 49 API calls 16935->16936 16937 7ff62ef93e6d 16936->16937 16937->16281 16939 7ff62ef91ef0 49 API calls 16938->16939 16940 7ff62ef94090 16939->16940 16940->16271 16942 7ff62efa0944 16941->16942 16954 7ff62efa06a4 16942->16954 16944 7ff62efa095d 16944->16912 16966 7ff62efa05fc 16945->16966 16949 7ff62efa0359 16948->16949 16951 7ff62ef91c32 16948->16951 16950 7ff62efa55c4 _get_daylight 11 API calls 16949->16950 16952 7ff62efa035e 16950->16952 16951->16933 16951->16934 16953 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 16952->16953 16953->16951 16955 7ff62efa070e 16954->16955 16956 7ff62efa06ce 16954->16956 16955->16956 16958 7ff62efa071a 16955->16958 16957 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 16956->16957 16964 7ff62efa06f5 16957->16964 16965 7ff62efa546c EnterCriticalSection 16958->16965 16964->16944 16967 7ff62ef91b59 16966->16967 16968 7ff62efa0626 16966->16968 16967->16918 16967->16919 16968->16967 16969 7ff62efa0672 16968->16969 16970 7ff62efa0635 __scrt_get_show_window_mode 16968->16970 16979 7ff62efa546c EnterCriticalSection 16969->16979 16972 7ff62efa55c4 _get_daylight 11 API calls 16970->16972 16974 7ff62efa064a 16972->16974 16976 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 16974->16976 16976->16967 16981 7ff62ef9869f GetTokenInformation 16980->16981 16982 7ff62ef98721 __std_exception_destroy 16980->16982 16983 7ff62ef986c0 GetLastError 16981->16983 16984 7ff62ef986cb 16981->16984 16985 7ff62ef98734 CloseHandle 16982->16985 16986 7ff62ef9873a 16982->16986 16983->16982 16983->16984 16984->16982 16987 7ff62ef986e7 GetTokenInformation 16984->16987 16985->16986 16986->16290 16987->16982 16988 7ff62ef9870a 16987->16988 16988->16982 16989 7ff62ef98714 ConvertSidToStringSidW 16988->16989 16989->16982 16991 7ff62ef98775 16990->16991 17007 7ff62efa4e18 16991->17007 16995 7ff62ef92c70 16994->16995 16996 7ff62efa4bc4 49 API calls 16995->16996 16997 7ff62ef92cbb __scrt_get_show_window_mode 16996->16997 16998 7ff62ef98be0 57 API calls 16997->16998 16999 7ff62ef92cf0 16998->16999 17000 7ff62ef92cf5 16999->17000 17001 7ff62ef92d2d MessageBoxA 16999->17001 17002 7ff62ef98be0 57 API calls 17000->17002 17003 7ff62ef92d47 17001->17003 17004 7ff62ef92d0f MessageBoxW 17002->17004 17005 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 17003->17005 17004->17003 17006 7ff62ef92d57 17005->17006 17006->16300 17009 7ff62efa4e72 17007->17009 17008 7ff62efa4e97 17010 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 17008->17010 17009->17008 17011 7ff62efa4ed3 17009->17011 17014 7ff62efa4ec1 17010->17014 17025 7ff62efa31d0 17011->17025 17013 7ff62efa4fb4 17016 7ff62efab00c __free_lconv_mon 11 API calls 17013->17016 17015 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 17014->17015 17017 7ff62ef98798 17015->17017 17016->17014 17017->16297 17019 7ff62efa4f89 17022 7ff62efab00c __free_lconv_mon 11 API calls 17019->17022 17020 7ff62efa4fda 17020->17013 17021 7ff62efa4fe4 17020->17021 17024 7ff62efab00c __free_lconv_mon 11 API calls 17021->17024 17022->17014 17023 7ff62efa4f80 17023->17013 17023->17019 17024->17014 17026 7ff62efa320e 17025->17026 17031 7ff62efa31fe 17025->17031 17027 7ff62efa3217 17026->17027 17032 7ff62efa3245 17026->17032 17029 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 17027->17029 17028 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 17030 7ff62efa323d 17028->17030 17029->17030 17030->17013 17030->17019 17030->17020 17030->17023 17031->17028 17032->17030 17032->17031 17036 7ff62efa3be4 17032->17036 17069 7ff62efa3630 17032->17069 17106 7ff62efa2dc0 17032->17106 17037 7ff62efa3c97 17036->17037 17038 7ff62efa3c26 17036->17038 17039 7ff62efa3cf0 17037->17039 17040 7ff62efa3c9c 17037->17040 17041 7ff62efa3cc1 17038->17041 17042 7ff62efa3c2c 17038->17042 17048 7ff62efa3d07 17039->17048 17049 7ff62efa3cfa 17039->17049 17054 7ff62efa3cff 17039->17054 17043 7ff62efa3c9e 17040->17043 17044 7ff62efa3cd1 17040->17044 17125 7ff62efa1f94 17041->17125 17045 7ff62efa3c31 17042->17045 17046 7ff62efa3c60 17042->17046 17047 7ff62efa3c40 17043->17047 17056 7ff62efa3cad 17043->17056 17132 7ff62efa1b84 17044->17132 17045->17048 17051 7ff62efa3c37 17045->17051 17046->17051 17046->17054 17067 7ff62efa3d30 17047->17067 17109 7ff62efa4398 17047->17109 17139 7ff62efa48ec 17048->17139 17049->17041 17049->17054 17051->17047 17057 7ff62efa3c72 17051->17057 17064 7ff62efa3c5b 17051->17064 17054->17067 17143 7ff62efa23a4 17054->17143 17056->17041 17059 7ff62efa3cb2 17056->17059 17057->17067 17119 7ff62efa46d4 17057->17119 17062 7ff62efa4798 37 API calls 17059->17062 17059->17067 17061 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 17063 7ff62efa402a 17061->17063 17062->17064 17063->17032 17065 7ff62efa4a00 45 API calls 17064->17065 17064->17067 17068 7ff62efa3f1c 17064->17068 17065->17068 17067->17061 17068->17067 17150 7ff62efaf0c8 17068->17150 17070 7ff62efa363e 17069->17070 17071 7ff62efa3654 17069->17071 17073 7ff62efa3c97 17070->17073 17074 7ff62efa3c26 17070->17074 17075 7ff62efa3694 17070->17075 17072 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 17071->17072 17071->17075 17072->17075 17076 7ff62efa3cf0 17073->17076 17077 7ff62efa3c9c 17073->17077 17078 7ff62efa3cc1 17074->17078 17079 7ff62efa3c2c 17074->17079 17075->17032 17085 7ff62efa3d07 17076->17085 17086 7ff62efa3cfa 17076->17086 17091 7ff62efa3cff 17076->17091 17080 7ff62efa3c9e 17077->17080 17081 7ff62efa3cd1 17077->17081 17087 7ff62efa1f94 38 API calls 17078->17087 17082 7ff62efa3c31 17079->17082 17083 7ff62efa3c60 17079->17083 17084 7ff62efa3c40 17080->17084 17095 7ff62efa3cad 17080->17095 17089 7ff62efa1b84 38 API calls 17081->17089 17082->17085 17088 7ff62efa3c37 17082->17088 17083->17088 17083->17091 17090 7ff62efa4398 47 API calls 17084->17090 17105 7ff62efa3d30 17084->17105 17092 7ff62efa48ec 45 API calls 17085->17092 17086->17078 17086->17091 17101 7ff62efa3c5b 17087->17101 17088->17084 17093 7ff62efa3c72 17088->17093 17088->17101 17089->17101 17090->17101 17094 7ff62efa23a4 38 API calls 17091->17094 17091->17105 17092->17101 17096 7ff62efa46d4 46 API calls 17093->17096 17093->17105 17094->17101 17095->17078 17097 7ff62efa3cb2 17095->17097 17096->17101 17099 7ff62efa4798 37 API calls 17097->17099 17097->17105 17098 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 17100 7ff62efa402a 17098->17100 17099->17101 17100->17032 17102 7ff62efa4a00 45 API calls 17101->17102 17104 7ff62efa3f1c 17101->17104 17101->17105 17102->17104 17103 7ff62efaf0c8 46 API calls 17103->17104 17104->17103 17104->17105 17105->17098 17181 7ff62efa1208 17106->17181 17110 7ff62efa43be 17109->17110 17111 7ff62efa0dc0 12 API calls 17110->17111 17112 7ff62efa440e 17111->17112 17113 7ff62efaec30 46 API calls 17112->17113 17114 7ff62efa44e1 17113->17114 17115 7ff62efa4a00 45 API calls 17114->17115 17116 7ff62efa4503 17114->17116 17115->17116 17117 7ff62efa4a00 45 API calls 17116->17117 17118 7ff62efa4591 17116->17118 17117->17118 17118->17064 17120 7ff62efa4709 17119->17120 17121 7ff62efa4727 17120->17121 17123 7ff62efa4a00 45 API calls 17120->17123 17124 7ff62efa474e 17120->17124 17122 7ff62efaf0c8 46 API calls 17121->17122 17122->17124 17123->17121 17124->17064 17126 7ff62efa1fc7 17125->17126 17127 7ff62efa1ff6 17126->17127 17129 7ff62efa20b3 17126->17129 17131 7ff62efa2033 17127->17131 17162 7ff62efa0e68 17127->17162 17130 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 17129->17130 17130->17131 17131->17064 17133 7ff62efa1bb7 17132->17133 17134 7ff62efa1be6 17133->17134 17136 7ff62efa1ca3 17133->17136 17135 7ff62efa0e68 12 API calls 17134->17135 17138 7ff62efa1c23 17134->17138 17135->17138 17137 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 17136->17137 17137->17138 17138->17064 17140 7ff62efa492f 17139->17140 17142 7ff62efa4933 __crtLCMapStringW 17140->17142 17170 7ff62efa4988 17140->17170 17142->17064 17144 7ff62efa23d7 17143->17144 17145 7ff62efa2406 17144->17145 17147 7ff62efa24c3 17144->17147 17146 7ff62efa0e68 12 API calls 17145->17146 17149 7ff62efa2443 17145->17149 17146->17149 17148 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 17147->17148 17148->17149 17149->17064 17151 7ff62efaf0f9 17150->17151 17159 7ff62efaf107 17150->17159 17152 7ff62efaf127 17151->17152 17153 7ff62efa4a00 45 API calls 17151->17153 17151->17159 17154 7ff62efaf15f 17152->17154 17155 7ff62efaf138 17152->17155 17153->17152 17157 7ff62efaf189 17154->17157 17158 7ff62efaf1ea 17154->17158 17154->17159 17174 7ff62efb0b80 17155->17174 17157->17159 17161 7ff62efafd00 _fread_nolock MultiByteToWideChar 17157->17161 17160 7ff62efafd00 _fread_nolock MultiByteToWideChar 17158->17160 17159->17068 17160->17159 17161->17159 17163 7ff62efa0e9f 17162->17163 17168 7ff62efa0e8e 17162->17168 17164 7ff62efadcbc _fread_nolock 12 API calls 17163->17164 17163->17168 17165 7ff62efa0ed0 17164->17165 17167 7ff62efab00c __free_lconv_mon 11 API calls 17165->17167 17169 7ff62efa0ee4 17165->17169 17166 7ff62efab00c __free_lconv_mon 11 API calls 17166->17168 17167->17169 17168->17131 17169->17166 17171 7ff62efa49ae 17170->17171 17172 7ff62efa49a6 17170->17172 17171->17142 17173 7ff62efa4a00 45 API calls 17172->17173 17173->17171 17177 7ff62efb77e0 17174->17177 17180 7ff62efb7844 17177->17180 17178 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 17180->17178 17182 7ff62efa124f 17181->17182 17183 7ff62efa123d 17181->17183 17186 7ff62efa125d 17182->17186 17190 7ff62efa1299 17182->17190 17184 7ff62efa55c4 _get_daylight 11 API calls 17183->17184 17185 7ff62efa1242 17184->17185 17187 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 17185->17187 17188 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 17186->17188 17195 7ff62efa124d 17187->17195 17188->17195 17189 7ff62efa1615 17191 7ff62efa55c4 _get_daylight 11 API calls 17189->17191 17189->17195 17190->17189 17192 7ff62efa55c4 _get_daylight 11 API calls 17190->17192 17193 7ff62efa18a9 17191->17193 17194 7ff62efa160a 17192->17194 17196 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 17193->17196 17197 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 17194->17197 17195->17032 17196->17195 17197->17189 17199 7ff62ef97976 17198->17199 17200 7ff62ef9799a 17199->17200 17201 7ff62ef979ed GetTempPathW 17199->17201 17203 7ff62ef97b70 61 API calls 17200->17203 17202 7ff62ef97a02 17201->17202 17237 7ff62ef92830 17202->17237 17204 7ff62ef979a6 17203->17204 17249 7ff62ef97430 17204->17249 17210 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 17212 7ff62ef9154f 17210->17212 17212->16307 17212->16308 17215 7ff62ef97a1b __std_exception_destroy 17216 7ff62ef97ac6 17215->17216 17220 7ff62ef97a51 17215->17220 17241 7ff62efa8ba4 17215->17241 17244 7ff62ef98b80 17215->17244 17218 7ff62ef98cf0 59 API calls 17216->17218 17222 7ff62ef97ad7 __std_exception_destroy 17218->17222 17221 7ff62ef98be0 57 API calls 17220->17221 17236 7ff62ef97a8a __std_exception_destroy 17220->17236 17223 7ff62ef97a67 17221->17223 17224 7ff62ef98be0 57 API calls 17222->17224 17222->17236 17225 7ff62ef97aa9 SetEnvironmentVariableW 17223->17225 17226 7ff62ef97a6c 17223->17226 17227 7ff62ef97af5 17224->17227 17225->17236 17228 7ff62ef98be0 57 API calls 17226->17228 17229 7ff62ef97afa 17227->17229 17230 7ff62ef97b2d SetEnvironmentVariableW 17227->17230 17231 7ff62ef97a7c 17228->17231 17230->17236 17236->17210 17238 7ff62ef92855 17237->17238 17239 7ff62efa4e18 48 API calls 17238->17239 17240 7ff62ef92874 17239->17240 17240->17215 17283 7ff62efa87d0 17241->17283 17245 7ff62ef98b90 17244->17245 17246 7ff62ef98ba6 CreateDirectoryW 17244->17246 17247 7ff62ef92c50 59 API calls 17245->17247 17246->17215 17248 7ff62ef98b9c 17247->17248 17248->17215 17250 7ff62ef9743c 17249->17250 17251 7ff62ef98be0 57 API calls 17250->17251 17252 7ff62ef9745e 17251->17252 17253 7ff62ef97466 17252->17253 17254 7ff62ef97479 ExpandEnvironmentStringsW 17252->17254 17255 7ff62ef92b30 59 API calls 17253->17255 17256 7ff62ef9749f __std_exception_destroy 17254->17256 17262 7ff62ef97472 17255->17262 17257 7ff62ef974a3 17256->17257 17258 7ff62ef974b6 17256->17258 17260 7ff62ef92b30 59 API calls 17257->17260 17263 7ff62ef974d0 17258->17263 17264 7ff62ef974c4 17258->17264 17259 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 17261 7ff62ef97598 17259->17261 17260->17262 17261->17236 17273 7ff62efa7eec 17261->17273 17262->17259 17416 7ff62efa6428 17263->17416 17409 7ff62efa7aa4 17264->17409 17267 7ff62ef974ce 17324 7ff62efb1cc8 17283->17324 17383 7ff62efb1a40 17324->17383 17404 7ff62efb0db8 EnterCriticalSection 17383->17404 17410 7ff62efa7af5 17409->17410 17411 7ff62efa7ac2 17409->17411 17410->17267 17411->17410 17428 7ff62efb0f54 17411->17428 17417 7ff62efa64b2 17416->17417 17418 7ff62efa6444 17416->17418 17462 7ff62efb05a0 17417->17462 17418->17417 17420 7ff62efa6449 17418->17420 17526 7ff62ef9173e 17525->17526 17527 7ff62ef91726 17525->17527 17529 7ff62ef91744 17526->17529 17530 7ff62ef91768 17526->17530 17528 7ff62ef92b30 59 API calls 17527->17528 17532 7ff62ef91732 17528->17532 17655 7ff62ef912b0 17529->17655 17618 7ff62ef97c20 17530->17618 17532->16332 17536 7ff62ef917b9 17541 7ff62ef93fe0 116 API calls 17536->17541 17537 7ff62ef9178d 17540 7ff62ef92890 59 API calls 17537->17540 17538 7ff62ef9175f 17538->16332 17539 7ff62ef92b30 59 API calls 17539->17538 17542 7ff62ef917a3 17540->17542 17543 7ff62ef917ce 17541->17543 17542->16332 17544 7ff62ef917ee 17543->17544 17545 7ff62ef917d6 17543->17545 17547 7ff62efa0914 73 API calls 17544->17547 17546 7ff62ef92b30 59 API calls 17545->17546 17549 7ff62ef917e5 17546->17549 17548 7ff62ef917ff 17547->17548 17550 7ff62ef91823 17548->17550 17551 7ff62ef91803 17548->17551 17553 7ff62efa028c 74 API calls 17549->17553 17554 7ff62ef91841 17550->17554 17555 7ff62ef91829 17550->17555 17552 7ff62ef92890 59 API calls 17551->17552 17556 7ff62ef91819 __std_exception_destroy 17552->17556 17557 7ff62ef91937 17553->17557 17560 7ff62ef91882 17554->17560 17561 7ff62ef91863 17554->17561 17637 7ff62ef91050 17555->17637 17559 7ff62efa028c 74 API calls 17556->17559 17557->16332 17559->17549 17560->17556 17563 7ff62efa05dc _fread_nolock 53 API calls 17560->17563 17564 7ff62ef918e5 17560->17564 17694 7ff62efa0d1c 17560->17694 17562 7ff62ef92890 59 API calls 17561->17562 17562->17556 17563->17560 17566 7ff62ef92890 59 API calls 17564->17566 17566->17556 17568 7ff62ef92d86 17567->17568 17569 7ff62ef91ef0 49 API calls 17568->17569 17570 7ff62ef92db9 17569->17570 17571 7ff62ef93e50 49 API calls 17570->17571 17597 7ff62ef930ea 17570->17597 17572 7ff62ef92e27 17571->17572 17573 7ff62ef93e50 49 API calls 17572->17573 17574 7ff62ef92e38 17573->17574 17575 7ff62ef92e95 17574->17575 17576 7ff62ef92e59 17574->17576 17577 7ff62ef931b0 75 API calls 17575->17577 17777 7ff62ef931b0 17576->17777 17579 7ff62ef92e93 17577->17579 17580 7ff62ef92ed4 17579->17580 17581 7ff62ef92f16 17579->17581 17785 7ff62ef975b0 17580->17785 17583 7ff62ef931b0 75 API calls 17581->17583 17585 7ff62ef92f40 17583->17585 17589 7ff62ef931b0 75 API calls 17585->17589 17594 7ff62ef92fdc 17585->17594 17586 7ff62ef93171 17593 7ff62ef92b30 59 API calls 17586->17593 17591 7ff62ef92f72 17589->17591 17590 7ff62ef92f11 17596 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 17590->17596 17591->17594 17598 7ff62ef931b0 75 API calls 17591->17598 17592 7ff62ef91eb0 59 API calls 17595 7ff62ef9302f 17592->17595 17593->17597 17594->17592 17611 7ff62ef930ef 17594->17611 17595->17597 17600 7ff62ef91ef0 49 API calls 17595->17600 17599 7ff62ef92fa0 17598->17599 17599->17594 17602 7ff62ef92fa4 17599->17602 17603 7ff62ef93057 17600->17603 17604 7ff62ef92b30 59 API calls 17602->17604 17603->17586 17605 7ff62ef91ef0 49 API calls 17603->17605 17604->17590 17607 7ff62ef93084 17605->17607 17606 7ff62ef92b30 59 API calls 17610 7ff62ef93148 17606->17610 17607->17586 17609 7ff62ef91ef0 49 API calls 17607->17609 17610->17586 17610->17606 17612 7ff62ef91710 135 API calls 17610->17612 17611->17610 17822 7ff62efa5170 17611->17822 17612->17610 17619 7ff62ef97c30 17618->17619 17620 7ff62ef91ef0 49 API calls 17619->17620 17621 7ff62ef97c71 17620->17621 17636 7ff62ef97cf1 17621->17636 17698 7ff62ef93f70 17621->17698 17623 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 17625 7ff62ef91785 17623->17625 17625->17536 17625->17537 17626 7ff62ef97d2b 17704 7ff62ef977d0 17626->17704 17629 7ff62ef97ce0 17633 7ff62ef92c50 59 API calls 17629->17633 17630 7ff62ef97d14 17634 7ff62ef92c50 59 API calls 17630->17634 17631 7ff62ef97b70 61 API calls 17632 7ff62ef97ca2 __std_exception_destroy 17631->17632 17632->17629 17632->17630 17633->17636 17634->17626 17635 7ff62ef93fe0 116 API calls 17635->17636 17636->17623 17638 7ff62ef910a6 17637->17638 17639 7ff62ef910d3 17638->17639 17640 7ff62ef910ad 17638->17640 17656 7ff62ef912c2 17655->17656 17657 7ff62ef93fe0 116 API calls 17656->17657 17658 7ff62ef912f2 17657->17658 17659 7ff62ef91311 17658->17659 17660 7ff62ef912fa 17658->17660 17662 7ff62efa0914 73 API calls 17659->17662 17661 7ff62ef92b30 59 API calls 17660->17661 17690 7ff62ef9130a __std_exception_destroy 17661->17690 17663 7ff62ef91323 17662->17663 17664 7ff62ef91327 17663->17664 17665 7ff62ef9134d 17663->17665 17666 7ff62ef92890 59 API calls 17664->17666 17670 7ff62ef91390 17665->17670 17671 7ff62ef91368 17665->17671 17667 7ff62ef9133e 17666->17667 17669 7ff62efa028c 74 API calls 17667->17669 17668 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 17674 7ff62ef91454 17668->17674 17669->17690 17673 7ff62ef913aa 17670->17673 17685 7ff62ef91463 17670->17685 17672 7ff62ef92890 59 API calls 17671->17672 17675 7ff62ef91383 17672->17675 17676 7ff62ef91050 98 API calls 17673->17676 17674->17538 17674->17539 17678 7ff62efa028c 74 API calls 17675->17678 17679 7ff62ef913bb 17676->17679 17677 7ff62ef913c3 17680 7ff62efa028c 74 API calls 17677->17680 17678->17690 17679->17677 17681 7ff62ef914d2 __std_exception_destroy 17679->17681 17682 7ff62ef913cf 17680->17682 17689 7ff62efa028c 74 API calls 17681->17689 17684 7ff62ef977d0 64 API calls 17682->17684 17683 7ff62efa05dc _fread_nolock 53 API calls 17683->17685 17686 7ff62ef913de 17684->17686 17685->17677 17685->17683 17687 7ff62ef914bb 17685->17687 17686->17690 17691 7ff62ef91ef0 49 API calls 17686->17691 17688 7ff62ef92890 59 API calls 17687->17688 17688->17681 17689->17690 17690->17668 17692 7ff62ef9140c 17691->17692 17692->17690 17748 7ff62ef94180 17692->17748 17695 7ff62efa0d4c 17694->17695 17762 7ff62efa0a6c 17695->17762 17699 7ff62ef93f7a 17698->17699 17700 7ff62ef98be0 57 API calls 17699->17700 17701 7ff62ef93fa2 17700->17701 17702 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 17701->17702 17703 7ff62ef93fca 17702->17703 17703->17626 17703->17631 17703->17632 17705 7ff62ef977e0 17704->17705 17706 7ff62ef91ef0 49 API calls 17705->17706 17707 7ff62ef97811 17706->17707 17708 7ff62ef97929 17707->17708 17709 7ff62ef91ef0 49 API calls 17707->17709 17710 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 17708->17710 17712 7ff62ef97838 17709->17712 17711 7ff62ef9793e 17710->17711 17711->17635 17711->17636 17712->17708 17718 7ff62efa61c8 17712->17718 17719 7ff62efab810 __CxxCallCatchBlock 45 API calls 17718->17719 17778 7ff62ef931e4 17777->17778 17779 7ff62efa4bc4 49 API calls 17778->17779 17780 7ff62ef9320a 17779->17780 17781 7ff62ef9321b 17780->17781 17837 7ff62efa5eec 17780->17837 17783 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 17781->17783 17784 7ff62ef93239 17783->17784 17784->17579 17786 7ff62ef975be 17785->17786 17787 7ff62ef93fe0 116 API calls 17786->17787 17788 7ff62ef975ed 17787->17788 17789 7ff62ef91ef0 49 API calls 17788->17789 17790 7ff62ef97616 17789->17790 17791 7ff62ef93f70 57 API calls 17790->17791 17808 7ff62ef9761d 17790->17808 17792 7ff62ef97630 17791->17792 17794 7ff62ef976b4 17792->17794 17803 7ff62ef97b70 61 API calls 17792->17803 17809 7ff62ef9764e __std_exception_destroy 17792->17809 17793 7ff62ef97799 17796 7ff62efa028c 74 API calls 17793->17796 17815 7ff62ef97795 17793->17815 17798 7ff62ef977d0 64 API calls 17794->17798 17795 7ff62ef976f9 17967 7ff62efa0324 17795->17967 17796->17815 17799 7ff62ef9769d 17800 7ff62ef97687 17801 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 17803->17809 17808->17793 17808->17795 17809->17799 17809->17800 17815->17801 17823 7ff62efa51aa 17822->17823 17824 7ff62efa517d 17822->17824 17825 7ff62efa51cd 17823->17825 17828 7ff62efa51e9 17823->17828 17826 7ff62efa55c4 _get_daylight 11 API calls 17824->17826 17834 7ff62efa5134 17824->17834 17827 7ff62efa55c4 _get_daylight 11 API calls 17825->17827 17829 7ff62efa5187 17826->17829 17831 7ff62efa51d2 17827->17831 17832 7ff62efa5098 45 API calls 17828->17832 17830 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 17829->17830 17833 7ff62efa5192 17830->17833 17835 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 17831->17835 17836 7ff62efa51dd 17832->17836 17833->17611 17834->17611 17835->17836 17836->17611 17838 7ff62efa5f15 17837->17838 17839 7ff62efa5f09 17837->17839 17841 7ff62efa5098 45 API calls 17838->17841 17854 7ff62efa5800 17839->17854 17842 7ff62efa5f3d 17841->17842 17843 7ff62efaf4e4 5 API calls 17842->17843 17844 7ff62efa5f4d 17842->17844 17843->17844 17845 7ff62efa5684 14 API calls 17844->17845 17846 7ff62efa5fa5 17845->17846 17847 7ff62efa5fbd 17846->17847 17849 7ff62efa5fa9 17846->17849 17848 7ff62efa5800 69 API calls 17847->17848 17850 7ff62efa5f0e 17849->17850 17851 7ff62efab00c __free_lconv_mon 11 API calls 17849->17851 17850->17781 17851->17850 17855 7ff62efa5837 17854->17855 17856 7ff62efa581a 17854->17856 17855->17856 17858 7ff62efa584a CreateFileW 17855->17858 17857 7ff62efa55a4 _fread_nolock 11 API calls 17856->17857 17859 7ff62efa581f 17857->17859 17860 7ff62efa587e 17858->17860 17861 7ff62efa58b4 17858->17861 17863 7ff62efa55c4 _get_daylight 11 API calls 17859->17863 17879 7ff62efa5954 GetFileType 17860->17879 17905 7ff62efa5ddc 17861->17905 17866 7ff62efa5827 17863->17866 17870 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 17866->17870 17880 7ff62efa5a5f 17879->17880 17881 7ff62efa59a2 17879->17881 17906 7ff62efa5e12 17905->17906 17968 7ff62efa033d 17967->17968 17969 7ff62efa032d 17967->17969 17994 7ff62ef9813a 17993->17994 17995 7ff62efaab1d 17993->17995 17999 7ff62efa8730 17994->17999 17996 7ff62efa55c4 _get_daylight 11 API calls 17995->17996 18012 7ff62efa64dc 18011->18012 18013 7ff62efa6502 18012->18013 18015 7ff62efa6535 18012->18015 18014 7ff62efa55c4 _get_daylight 11 API calls 18013->18014 18016 7ff62efa6507 18014->18016 18017 7ff62efa6548 18015->18017 18018 7ff62efa653b 18015->18018 18019 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 18016->18019 18030 7ff62efab2ec 18017->18030 18021 7ff62efa55c4 _get_daylight 11 API calls 18018->18021 18020 7ff62ef94039 18019->18020 18020->16387 18021->18020 18043 7ff62efb0db8 EnterCriticalSection 18030->18043 18391 7ff62efa91a0 18390->18391 18394 7ff62efa8c7c 18391->18394 18393 7ff62efa91b9 18393->16395 18395 7ff62efa8cc6 18394->18395 18396 7ff62efa8c97 18394->18396 18404 7ff62efa546c EnterCriticalSection 18395->18404 18397 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 18396->18397 18403 7ff62efa8cb7 18397->18403 18403->18393 18406 7ff62efa00b1 18405->18406 18407 7ff62efa0083 18405->18407 18410 7ff62efa00a3 18406->18410 18415 7ff62efa546c EnterCriticalSection 18406->18415 18408 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 18407->18408 18408->18410 18410->16401 18417 7ff62ef93fe0 116 API calls 18416->18417 18418 7ff62ef915c7 18417->18418 18419 7ff62ef915cf 18418->18419 18420 7ff62ef915f0 18418->18420 18422 7ff62ef92b30 59 API calls 18419->18422 18421 7ff62efa0914 73 API calls 18420->18421 18423 7ff62ef91601 18421->18423 18424 7ff62ef915df 18422->18424 18425 7ff62ef91621 18423->18425 18426 7ff62ef91605 18423->18426 18424->16406 18428 7ff62ef91651 18425->18428 18429 7ff62ef91631 18425->18429 18427 7ff62ef92890 59 API calls 18426->18427 18438 7ff62ef9161c __std_exception_destroy 18427->18438 18431 7ff62ef91666 18428->18431 18436 7ff62ef9167d 18428->18436 18430 7ff62ef92890 59 API calls 18429->18430 18430->18438 18434 7ff62ef91050 98 API calls 18431->18434 18432 7ff62efa028c 74 API calls 18433 7ff62ef916f7 18432->18433 18433->16406 18434->18438 18435 7ff62efa05dc _fread_nolock 53 API calls 18435->18436 18436->18435 18437 7ff62ef916be 18436->18437 18436->18438 18439 7ff62ef92890 59 API calls 18437->18439 18438->18432 18439->18438 18441 7ff62ef9196f 18440->18441 18443 7ff62ef919d3 18440->18443 18442 7ff62efa5170 45 API calls 18441->18442 18441->18443 18442->18441 18443->16417 18445 7ff62ef98be0 57 API calls 18444->18445 18446 7ff62ef98287 LoadLibraryExW 18445->18446 18447 7ff62ef982a4 __std_exception_destroy 18446->18447 18447->16433 18449 7ff62ef96f29 18448->18449 18450 7ff62ef96f4c GetProcAddress 18448->18450 18453 7ff62ef929e0 57 API calls 18449->18453 18450->18449 18451 7ff62ef96f71 GetProcAddress 18450->18451 18451->18449 18452 7ff62ef96f96 GetProcAddress 18451->18452 18452->18449 18454 7ff62ef96fbe GetProcAddress 18452->18454 18455 7ff62ef96f3c 18453->18455 18454->18449 18456 7ff62ef96fe6 GetProcAddress 18454->18456 18455->16440 18456->18449 18457 7ff62ef9700e GetProcAddress 18456->18457 18507->16449 18508->16450 18510 7ff62ef95be0 18509->18510 18511 7ff62ef91ef0 49 API calls 18510->18511 18512 7ff62ef95c12 18511->18512 18513 7ff62ef95c3b 18512->18513 18514 7ff62ef95c1b 18512->18514 18516 7ff62ef95c92 18513->18516 18518 7ff62ef94060 49 API calls 18513->18518 18515 7ff62ef92b30 59 API calls 18514->18515 18520 7ff62ef95c31 18515->18520 18517 7ff62ef94060 49 API calls 18516->18517 18519 7ff62ef95cab 18517->18519 18521 7ff62ef95c5c 18518->18521 18523 7ff62ef95cc9 18519->18523 18526 7ff62ef92b30 59 API calls 18519->18526 18522 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 18520->18522 18524 7ff62ef95c7a 18521->18524 18528 7ff62ef92b30 59 API calls 18521->18528 18525 7ff62ef9346e 18522->18525 18527 7ff62ef98270 58 API calls 18523->18527 18529 7ff62ef93f70 57 API calls 18524->18529 18525->16460 18537 7ff62ef95d30 18525->18537 18526->18523 18531 7ff62ef95cd6 18527->18531 18528->18524 18530 7ff62ef95c84 18529->18530 18530->18516 18534 7ff62ef98270 58 API calls 18530->18534 18532 7ff62ef95cdb 18531->18532 18533 7ff62ef95cfd 18531->18533 18535 7ff62ef929e0 57 API calls 18532->18535 18607 7ff62ef951f0 GetProcAddress 18533->18607 18534->18516 18535->18520 18691 7ff62ef94df0 18537->18691 18539 7ff62ef95d54 18540 7ff62ef95d5c 18539->18540 18541 7ff62ef95d6d 18539->18541 18542 7ff62ef92b30 59 API calls 18540->18542 18698 7ff62ef94540 18541->18698 18548 7ff62ef95d68 18542->18548 18545 7ff62ef95d79 18547 7ff62ef92b30 59 API calls 18545->18547 18546 7ff62ef95d8a 18549 7ff62ef95d97 18546->18549 18550 7ff62ef95da8 18546->18550 18547->18548 18548->16462 18579 7ff62ef95947 18578->18579 18579->18579 18580 7ff62ef95970 18579->18580 18581 7ff62ef95987 __std_exception_destroy 18579->18581 18582 7ff62ef92b30 59 API calls 18580->18582 18584 7ff62ef915a0 122 API calls 18581->18584 18585 7ff62ef92b30 59 API calls 18581->18585 18586 7ff62ef95a77 18581->18586 18584->18581 18585->18581 18608 7ff62ef95230 GetProcAddress 18607->18608 18609 7ff62ef95212 18607->18609 18608->18609 18610 7ff62ef95255 GetProcAddress 18608->18610 18611 7ff62ef929e0 57 API calls 18609->18611 18610->18609 18612 7ff62ef9527a GetProcAddress 18610->18612 18613 7ff62ef95225 18611->18613 18612->18609 18614 7ff62ef952a2 GetProcAddress 18612->18614 18613->18520 18614->18609 18615 7ff62ef952ca GetProcAddress 18614->18615 18615->18609 18616 7ff62ef952f2 GetProcAddress 18615->18616 18616->18609 18617 7ff62ef9531a GetProcAddress 18616->18617 18618 7ff62ef95342 GetProcAddress 18617->18618 18619 7ff62ef95336 18617->18619 18620 7ff62ef9535e 18618->18620 18621 7ff62ef9536a GetProcAddress 18618->18621 18619->18618 18620->18621 18694 7ff62ef94e15 18691->18694 18692 7ff62ef94e1d 18692->18539 18693 7ff62ef9515a __std_exception_destroy 18693->18539 18694->18692 18696 7ff62ef94faf 18694->18696 18733 7ff62efa70b8 18694->18733 18695 7ff62ef94260 47 API calls 18695->18696 18696->18693 18696->18695 18699 7ff62ef94570 18698->18699 18700 7ff62ef9bdc0 _wfindfirst32i64 8 API calls 18699->18700 18701 7ff62ef945d2 18700->18701 18701->18545 18701->18546 18734 7ff62efa70e8 18733->18734 18737 7ff62efa65b4 18734->18737 18736 7ff62efa7118 18736->18694 18738 7ff62efa65e5 18737->18738 18739 7ff62efa65f7 18737->18739 18740 7ff62efa55c4 _get_daylight 11 API calls 18738->18740 18741 7ff62efa6641 18739->18741 18744 7ff62efa6604 18739->18744 18743 7ff62efa65ea 18740->18743 18742 7ff62efa665c 18741->18742 18745 7ff62efa4a00 45 API calls 18741->18745 18750 7ff62efa667e 18742->18750 18758 7ff62efa7040 18742->18758 18747 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 18743->18747 18748 7ff62efaaed8 _invalid_parameter_noinfo 37 API calls 18744->18748 18745->18742 18749 7ff62efa65f5 18747->18749 18748->18749 18749->18736 18751 7ff62efa671f 18750->18751 18752 7ff62efa55c4 _get_daylight 11 API calls 18750->18752 18751->18749 18753 7ff62efa55c4 _get_daylight 11 API calls 18751->18753 18754 7ff62efa6714 18752->18754 18755 7ff62efa67ca 18753->18755 18756 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 18754->18756 18756->18751 18759 7ff62efa7063 18758->18759 18760 7ff62efa707a 18758->18760 18764 7ff62efb0a48 18759->18764 18762 7ff62efa7068 18760->18762 18769 7ff62efb0a78 18760->18769 18762->18742 18765 7ff62efab810 __CxxCallCatchBlock 45 API calls 18764->18765 18854 7ff62efab810 __CxxCallCatchBlock 45 API calls 18853->18854 18855 7ff62efaaa71 18854->18855 18856 7ff62efaab9c __CxxCallCatchBlock 45 API calls 18855->18856 18857 7ff62efaaa91 18856->18857 19106 7ff62efab690 19107 7ff62efab695 19106->19107 19111 7ff62efab6aa 19106->19111 19112 7ff62efab6b0 19107->19112 19113 7ff62efab6f2 19112->19113 19116 7ff62efab6fa 19112->19116 19114 7ff62efab00c __free_lconv_mon 11 API calls 19113->19114 19114->19116 19115 7ff62efab00c __free_lconv_mon 11 API calls 19117 7ff62efab707 19115->19117 19116->19115 19118 7ff62efab00c __free_lconv_mon 11 API calls 19117->19118 19119 7ff62efab714 19118->19119 19120 7ff62efab00c __free_lconv_mon 11 API calls 19119->19120 19121 7ff62efab721 19120->19121 19122 7ff62efab00c __free_lconv_mon 11 API calls 19121->19122 19123 7ff62efab72e 19122->19123 19124 7ff62efab00c __free_lconv_mon 11 API calls 19123->19124 19125 7ff62efab73b 19124->19125 19126 7ff62efab00c __free_lconv_mon 11 API calls 19125->19126 19127 7ff62efab748 19126->19127 19128 7ff62efab00c __free_lconv_mon 11 API calls 19127->19128 19129 7ff62efab755 19128->19129 19130 7ff62efab00c __free_lconv_mon 11 API calls 19129->19130 19131 7ff62efab765 19130->19131 19132 7ff62efab00c __free_lconv_mon 11 API calls 19131->19132 19133 7ff62efab775 19132->19133 19138 7ff62efab558 19133->19138 19152 7ff62efb0db8 EnterCriticalSection 19138->19152 19158 7ff62ef9c090 19159 7ff62ef9c0a0 19158->19159 19175 7ff62efaa238 19159->19175 19161 7ff62ef9c0ac 19181 7ff62ef9c398 19161->19181 19163 7ff62ef9c67c 7 API calls 19165 7ff62ef9c145 19163->19165 19164 7ff62ef9c0c4 _RTC_Initialize 19173 7ff62ef9c119 19164->19173 19186 7ff62ef9c548 19164->19186 19167 7ff62ef9c0d9 19189 7ff62efa96a4 19167->19189 19173->19163 19174 7ff62ef9c135 19173->19174 19176 7ff62efaa249 19175->19176 19177 7ff62efaa251 19176->19177 19178 7ff62efa55c4 _get_daylight 11 API calls 19176->19178 19177->19161 19179 7ff62efaa260 19178->19179 19180 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 19179->19180 19180->19177 19182 7ff62ef9c3a9 19181->19182 19185 7ff62ef9c3ae __scrt_release_startup_lock 19181->19185 19183 7ff62ef9c67c 7 API calls 19182->19183 19182->19185 19184 7ff62ef9c422 19183->19184 19185->19164 19214 7ff62ef9c50c 19186->19214 19188 7ff62ef9c551 19188->19167 19190 7ff62efa96c4 19189->19190 19191 7ff62ef9c0e5 19189->19191 19192 7ff62efa96e2 GetModuleFileNameW 19190->19192 19193 7ff62efa96cc 19190->19193 19191->19173 19213 7ff62ef9c61c InitializeSListHead 19191->19213 19197 7ff62efa970d 19192->19197 19194 7ff62efa55c4 _get_daylight 11 API calls 19193->19194 19195 7ff62efa96d1 19194->19195 19196 7ff62efaafa4 _invalid_parameter_noinfo 37 API calls 19195->19196 19196->19191 19229 7ff62efa9644 19197->19229 19200 7ff62efa9755 19201 7ff62efa55c4 _get_daylight 11 API calls 19200->19201 19202 7ff62efa975a 19201->19202 19203 7ff62efab00c __free_lconv_mon 11 API calls 19202->19203 19203->19191 19204 7ff62efa978f 19206 7ff62efab00c __free_lconv_mon 11 API calls 19204->19206 19205 7ff62efa976d 19205->19204 19207 7ff62efa97d4 19205->19207 19208 7ff62efa97bb 19205->19208 19206->19191 19211 7ff62efab00c __free_lconv_mon 11 API calls 19207->19211 19209 7ff62efab00c __free_lconv_mon 11 API calls 19208->19209 19210 7ff62efa97c4 19209->19210 19212 7ff62efab00c __free_lconv_mon 11 API calls 19210->19212 19211->19204 19212->19191 19215 7ff62ef9c526 19214->19215 19217 7ff62ef9c51f 19214->19217 19218 7ff62efaa87c 19215->19218 19217->19188 19221 7ff62efaa4b8 19218->19221 19228 7ff62efb0db8 EnterCriticalSection 19221->19228 19230 7ff62efa9694 19229->19230 19231 7ff62efa965c 19229->19231 19230->19200 19230->19205 19231->19230 19232 7ff62efaf258 _get_daylight 11 API calls 19231->19232 19233 7ff62efa968a 19232->19233 19234 7ff62efab00c __free_lconv_mon 11 API calls 19233->19234 19234->19230 19539 7ff62efa5410 19540 7ff62efa541b 19539->19540 19548 7ff62efaf864 19540->19548 19561 7ff62efb0db8 EnterCriticalSection 19548->19561 19235 7ff62efbac89 19236 7ff62efbaca2 19235->19236 19237 7ff62efbac98 19235->19237 19239 7ff62efb0e18 LeaveCriticalSection 19237->19239 19592 7ff62efb1e20 19603 7ff62efb7db4 19592->19603 19604 7ff62efb7dc1 19603->19604 19605 7ff62efab00c __free_lconv_mon 11 API calls 19604->19605 19607 7ff62efb7ddd 19604->19607 19605->19604 19606 7ff62efab00c __free_lconv_mon 11 API calls 19606->19607 19607->19606 19608 7ff62efb1e29 19607->19608 19609 7ff62efb0db8 EnterCriticalSection 19608->19609

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            • Executed
                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                            control_flow_graph 111 7ff62efb6470-7ff62efb64ab call 7ff62efb5df8 call 7ff62efb5e00 call 7ff62efb5e68 118 7ff62efb64b1-7ff62efb64bc call 7ff62efb5e08 111->118 119 7ff62efb66d5-7ff62efb6721 call 7ff62efaafc4 call 7ff62efb5df8 call 7ff62efb5e00 call 7ff62efb5e68 111->119 118->119 124 7ff62efb64c2-7ff62efb64cc 118->124 145 7ff62efb685f-7ff62efb68cd call 7ff62efaafc4 call 7ff62efb1ce8 119->145 146 7ff62efb6727-7ff62efb6732 call 7ff62efb5e08 119->146 126 7ff62efb64ee-7ff62efb64f2 124->126 127 7ff62efb64ce-7ff62efb64d1 124->127 131 7ff62efb64f5-7ff62efb64fd 126->131 129 7ff62efb64d4-7ff62efb64df 127->129 132 7ff62efb64e1-7ff62efb64e8 129->132 133 7ff62efb64ea-7ff62efb64ec 129->133 131->131 135 7ff62efb64ff-7ff62efb6512 call 7ff62efadcbc 131->135 132->129 132->133 133->126 137 7ff62efb651b-7ff62efb6529 133->137 142 7ff62efb6514-7ff62efb6516 call 7ff62efab00c 135->142 143 7ff62efb652a-7ff62efb6536 call 7ff62efab00c 135->143 142->137 151 7ff62efb653d-7ff62efb6545 143->151 163 7ff62efb68cf-7ff62efb68d6 145->163 164 7ff62efb68db-7ff62efb68de 145->164 146->145 156 7ff62efb6738-7ff62efb6743 call 7ff62efb5e38 146->156 151->151 155 7ff62efb6547-7ff62efb6558 call 7ff62efb0f54 151->155 155->119 166 7ff62efb655e-7ff62efb65b4 call 7ff62ef9d1e0 * 4 call 7ff62efb638c 155->166 156->145 165 7ff62efb6749-7ff62efb676c call 7ff62efab00c GetTimeZoneInformation 156->165 167 7ff62efb696b-7ff62efb696e 163->167 169 7ff62efb68e0 164->169 170 7ff62efb6915-7ff62efb6928 call 7ff62efadcbc 164->170 177 7ff62efb6834-7ff62efb685e call 7ff62efb5df0 call 7ff62efb5de0 call 7ff62efb5de8 165->177 178 7ff62efb6772-7ff62efb6793 165->178 223 7ff62efb65b6-7ff62efb65ba 166->223 173 7ff62efb68e3 call 7ff62efb66ec 167->173 174 7ff62efb6974-7ff62efb697c call 7ff62efb6470 167->174 169->173 189 7ff62efb6933-7ff62efb694e call 7ff62efb1ce8 170->189 190 7ff62efb692a 170->190 185 7ff62efb68e8-7ff62efb6914 call 7ff62efab00c call 7ff62ef9bdc0 173->185 174->185 183 7ff62efb679e-7ff62efb67a5 178->183 184 7ff62efb6795-7ff62efb679b 178->184 192 7ff62efb67b9 183->192 193 7ff62efb67a7-7ff62efb67af 183->193 184->183 206 7ff62efb6950-7ff62efb6953 189->206 207 7ff62efb6955-7ff62efb6967 call 7ff62efab00c 189->207 197 7ff62efb692c-7ff62efb6931 call 7ff62efab00c 190->197 203 7ff62efb67bb-7ff62efb682f call 7ff62ef9d1e0 * 4 call 7ff62efb32cc call 7ff62efb6984 * 2 192->203 193->192 199 7ff62efb67b1-7ff62efb67b7 193->199 197->169 199->203 203->177 206->197 207->167 225 7ff62efb65c0-7ff62efb65c4 223->225 226 7ff62efb65bc 223->226 225->223 228 7ff62efb65c6-7ff62efb65eb call 7ff62efa716c 225->228 226->225 235 7ff62efb65ee-7ff62efb65f2 228->235 237 7ff62efb6601-7ff62efb6605 235->237 238 7ff62efb65f4-7ff62efb65ff 235->238 237->235 238->237 240 7ff62efb6607-7ff62efb660b 238->240 242 7ff62efb668c-7ff62efb6690 240->242 243 7ff62efb660d-7ff62efb6635 call 7ff62efa716c 240->243 244 7ff62efb6692-7ff62efb6694 242->244 245 7ff62efb6697-7ff62efb66a4 242->245 252 7ff62efb6653-7ff62efb6657 243->252 253 7ff62efb6637 243->253 244->245 247 7ff62efb66bf-7ff62efb66ce call 7ff62efb5df0 call 7ff62efb5de0 245->247 248 7ff62efb66a6-7ff62efb66bc call 7ff62efb638c 245->248 247->119 248->247 252->242 256 7ff62efb6659-7ff62efb6677 call 7ff62efa716c 252->256 254 7ff62efb663a-7ff62efb6641 253->254 254->252 258 7ff62efb6643-7ff62efb6651 254->258 263 7ff62efb6683-7ff62efb668a 256->263 258->252 258->254 263->242 264 7ff62efb6679-7ff62efb667d 263->264 264->242 265 7ff62efb667f 264->265 265->263
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • _get_daylight.LIBCMT ref: 00007FF62EFB64B5
                                                                                                                                                                                              • Part of subcall function 00007FF62EFB5E08: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62EFB5E1C
                                                                                                                                                                                              • Part of subcall function 00007FF62EFAB00C: RtlFreeHeap.NTDLL(?,?,?,00007FF62EFB3492,?,?,?,00007FF62EFB34CF,?,?,00000000,00007FF62EFB3995,?,?,00000000,00007FF62EFB38C7), ref: 00007FF62EFAB022
                                                                                                                                                                                              • Part of subcall function 00007FF62EFAB00C: GetLastError.KERNEL32(?,?,?,00007FF62EFB3492,?,?,?,00007FF62EFB34CF,?,?,00000000,00007FF62EFB3995,?,?,00000000,00007FF62EFB38C7), ref: 00007FF62EFAB02C
                                                                                                                                                                                              • Part of subcall function 00007FF62EFAAFC4: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF62EFAAFA3,?,?,?,?,?,00007FF62EFA31CC), ref: 00007FF62EFAAFCD
                                                                                                                                                                                              • Part of subcall function 00007FF62EFAAFC4: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF62EFAAFA3,?,?,?,?,?,00007FF62EFA31CC), ref: 00007FF62EFAAFF2
                                                                                                                                                                                            • _get_daylight.LIBCMT ref: 00007FF62EFB64A4
                                                                                                                                                                                              • Part of subcall function 00007FF62EFB5E68: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62EFB5E7C
                                                                                                                                                                                            • _get_daylight.LIBCMT ref: 00007FF62EFB671A
                                                                                                                                                                                            • _get_daylight.LIBCMT ref: 00007FF62EFB672B
                                                                                                                                                                                            • _get_daylight.LIBCMT ref: 00007FF62EFB673C
                                                                                                                                                                                            • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF62EFB697C), ref: 00007FF62EFB6763
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
                                                                                                                                                                                            • String ID: Eastern Standard Time$Eastern Summer Time
                                                                                                                                                                                            • API String ID: 4070488512-239921721
                                                                                                                                                                                            • Opcode ID: 0fbca74829f5eb391b29e48272e935aab84cd8bbcbc1d6e9a96b388f8462614d
                                                                                                                                                                                            • Instruction ID: 4b48acab48d57b38edcc20d9383ffbaca1167f46fb96152c31488d3b15dff031
                                                                                                                                                                                            • Opcode Fuzzy Hash: 0fbca74829f5eb391b29e48272e935aab84cd8bbcbc1d6e9a96b388f8462614d
                                                                                                                                                                                            • Instruction Fuzzy Hash: 2ED1DE66F0824286EF20EF21DC901B96761EFA8784F45813EFA4DC7A95DE3DE641C742

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            • Executed
                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                            control_flow_graph 444 7ff62efb73bc-7ff62efb742f call 7ff62efb70f0 447 7ff62efb7431-7ff62efb743a call 7ff62efa55a4 444->447 448 7ff62efb7449-7ff62efb7453 call 7ff62efa8534 444->448 453 7ff62efb743d-7ff62efb7444 call 7ff62efa55c4 447->453 454 7ff62efb746e-7ff62efb74d7 CreateFileW 448->454 455 7ff62efb7455-7ff62efb746c call 7ff62efa55a4 call 7ff62efa55c4 448->455 468 7ff62efb778a-7ff62efb77aa 453->468 456 7ff62efb7554-7ff62efb755f GetFileType 454->456 457 7ff62efb74d9-7ff62efb74df 454->457 455->453 463 7ff62efb7561-7ff62efb759c GetLastError call 7ff62efa5538 CloseHandle 456->463 464 7ff62efb75b2-7ff62efb75b9 456->464 460 7ff62efb7521-7ff62efb754f GetLastError call 7ff62efa5538 457->460 461 7ff62efb74e1-7ff62efb74e5 457->461 460->453 461->460 466 7ff62efb74e7-7ff62efb751f CreateFileW 461->466 463->453 479 7ff62efb75a2-7ff62efb75ad call 7ff62efa55c4 463->479 471 7ff62efb75c1-7ff62efb75c4 464->471 472 7ff62efb75bb-7ff62efb75bf 464->472 466->456 466->460 473 7ff62efb75c6 471->473 474 7ff62efb75ca-7ff62efb761f call 7ff62efa844c 471->474 472->474 473->474 482 7ff62efb7621-7ff62efb762d call 7ff62efb72f8 474->482 483 7ff62efb763e-7ff62efb766f call 7ff62efb6e70 474->483 479->453 482->483 489 7ff62efb762f 482->489 490 7ff62efb7671-7ff62efb7673 483->490 491 7ff62efb7675-7ff62efb76b7 483->491 494 7ff62efb7631-7ff62efb7639 call 7ff62efab184 489->494 490->494 492 7ff62efb76d9-7ff62efb76e4 491->492 493 7ff62efb76b9-7ff62efb76bd 491->493 496 7ff62efb7788 492->496 497 7ff62efb76ea-7ff62efb76ee 492->497 493->492 495 7ff62efb76bf-7ff62efb76d4 493->495 494->468 495->492 496->468 497->496 499 7ff62efb76f4-7ff62efb7739 CloseHandle CreateFileW 497->499 501 7ff62efb776e-7ff62efb7783 499->501 502 7ff62efb773b-7ff62efb7769 GetLastError call 7ff62efa5538 call 7ff62efa8674 499->502 501->496 502->501
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1617910340-0
                                                                                                                                                                                            • Opcode ID: 3a34930d5f91773cec3df5f99ae8c8b4927d9c8c66a9e1d3c980e3b08bacfc22
                                                                                                                                                                                            • Instruction ID: c9e006dbd8c3e4dbf78255d3cc92ada53dcc22fe881a638a5a87fe20286f2904
                                                                                                                                                                                            • Opcode Fuzzy Hash: 3a34930d5f91773cec3df5f99ae8c8b4927d9c8c66a9e1d3c980e3b08bacfc22
                                                                                                                                                                                            • Instruction Fuzzy Hash: 20C1A036F28A4285EF10CF69C8906AD3761EB59B98B41433DEA1E9B7D4CF38D655C301

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            APIs
                                                                                                                                                                                            • GetTempPathW.KERNEL32(00000000,?,00000000,00000000,?,00007FF62EF9154F), ref: 00007FF62EF979F7
                                                                                                                                                                                              • Part of subcall function 00007FF62EF97B70: GetEnvironmentVariableW.KERNEL32(00007FF62EF93A1F), ref: 00007FF62EF97BAA
                                                                                                                                                                                              • Part of subcall function 00007FF62EF97B70: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF62EF97BC7
                                                                                                                                                                                              • Part of subcall function 00007FF62EFA7EEC: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62EFA7F05
                                                                                                                                                                                            • SetEnvironmentVariableW.KERNEL32 ref: 00007FF62EF97AB1
                                                                                                                                                                                              • Part of subcall function 00007FF62EF92B30: MessageBoxW.USER32 ref: 00007FF62EF92C05
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Environment$Variable$ExpandMessagePathStringsTemp_invalid_parameter_noinfo
                                                                                                                                                                                            • String ID: LOADER: Failed to set the TMP environment variable.$TMP$TMP$_MEI%d
                                                                                                                                                                                            • API String ID: 3752271684-1116378104
                                                                                                                                                                                            • Opcode ID: 5ba17ae65ebc39be6e5ecc80ca7826a35a7ea09f79554ee3d64871af99c4e77d
                                                                                                                                                                                            • Instruction ID: 93e75d46016d04afb85f3e2198ad38ee821f2a01282c17f948003cb74e92e4bc
                                                                                                                                                                                            • Opcode Fuzzy Hash: 5ba17ae65ebc39be6e5ecc80ca7826a35a7ea09f79554ee3d64871af99c4e77d
                                                                                                                                                                                            • Instruction Fuzzy Hash: 83515C11F0964341FF58AE26AC252BA52516FA9BC0F48843DFD4ECB7D7ED2CE7018242

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            • Executed
                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                            control_flow_graph 751 7ff62efb66ec-7ff62efb6721 call 7ff62efb5df8 call 7ff62efb5e00 call 7ff62efb5e68 758 7ff62efb685f-7ff62efb68cd call 7ff62efaafc4 call 7ff62efb1ce8 751->758 759 7ff62efb6727-7ff62efb6732 call 7ff62efb5e08 751->759 770 7ff62efb68cf-7ff62efb68d6 758->770 771 7ff62efb68db-7ff62efb68de 758->771 759->758 765 7ff62efb6738-7ff62efb6743 call 7ff62efb5e38 759->765 765->758 772 7ff62efb6749-7ff62efb676c call 7ff62efab00c GetTimeZoneInformation 765->772 773 7ff62efb696b-7ff62efb696e 770->773 775 7ff62efb68e0 771->775 776 7ff62efb6915-7ff62efb6928 call 7ff62efadcbc 771->776 781 7ff62efb6834-7ff62efb685e call 7ff62efb5df0 call 7ff62efb5de0 call 7ff62efb5de8 772->781 782 7ff62efb6772-7ff62efb6793 772->782 778 7ff62efb68e3 call 7ff62efb66ec 773->778 779 7ff62efb6974-7ff62efb697c call 7ff62efb6470 773->779 775->778 791 7ff62efb6933-7ff62efb694e call 7ff62efb1ce8 776->791 792 7ff62efb692a 776->792 788 7ff62efb68e8-7ff62efb6914 call 7ff62efab00c call 7ff62ef9bdc0 778->788 779->788 786 7ff62efb679e-7ff62efb67a5 782->786 787 7ff62efb6795-7ff62efb679b 782->787 794 7ff62efb67b9 786->794 795 7ff62efb67a7-7ff62efb67af 786->795 787->786 806 7ff62efb6950-7ff62efb6953 791->806 807 7ff62efb6955-7ff62efb6967 call 7ff62efab00c 791->807 798 7ff62efb692c-7ff62efb6931 call 7ff62efab00c 792->798 803 7ff62efb67bb-7ff62efb682f call 7ff62ef9d1e0 * 4 call 7ff62efb32cc call 7ff62efb6984 * 2 794->803 795->794 800 7ff62efb67b1-7ff62efb67b7 795->800 798->775 800->803 803->781 806->798 807->773
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • _get_daylight.LIBCMT ref: 00007FF62EFB671A
                                                                                                                                                                                              • Part of subcall function 00007FF62EFB5E68: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62EFB5E7C
                                                                                                                                                                                            • _get_daylight.LIBCMT ref: 00007FF62EFB672B
                                                                                                                                                                                              • Part of subcall function 00007FF62EFB5E08: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62EFB5E1C
                                                                                                                                                                                            • _get_daylight.LIBCMT ref: 00007FF62EFB673C
                                                                                                                                                                                              • Part of subcall function 00007FF62EFB5E38: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62EFB5E4C
                                                                                                                                                                                              • Part of subcall function 00007FF62EFAB00C: RtlFreeHeap.NTDLL(?,?,?,00007FF62EFB3492,?,?,?,00007FF62EFB34CF,?,?,00000000,00007FF62EFB3995,?,?,00000000,00007FF62EFB38C7), ref: 00007FF62EFAB022
                                                                                                                                                                                              • Part of subcall function 00007FF62EFAB00C: GetLastError.KERNEL32(?,?,?,00007FF62EFB3492,?,?,?,00007FF62EFB34CF,?,?,00000000,00007FF62EFB3995,?,?,00000000,00007FF62EFB38C7), ref: 00007FF62EFAB02C
                                                                                                                                                                                            • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF62EFB697C), ref: 00007FF62EFB6763
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                                                                                                                                                                                            • String ID: Eastern Standard Time$Eastern Summer Time
                                                                                                                                                                                            • API String ID: 3458911817-239921721
                                                                                                                                                                                            • Opcode ID: 5b5d09b228255999272c5ce90a56ec2a5c1c9b61d05c7224e163f0b1bb3d1365
                                                                                                                                                                                            • Instruction ID: 61ef16d6abe809c2c2ad56f5b7dc5667744bd4fdbfe5bb91cce5f0d6e547c438
                                                                                                                                                                                            • Opcode Fuzzy Hash: 5b5d09b228255999272c5ce90a56ec2a5c1c9b61d05c7224e163f0b1bb3d1365
                                                                                                                                                                                            • Instruction Fuzzy Hash: 70518B36E1864286EB20DF21EC901A97761BFAC784F45813EFA4DC3696DF3CE6408752
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: CurrentFeaturePresentProcessProcessor
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1010374628-0
                                                                                                                                                                                            • Opcode ID: ffb4a1b8254bdec2d8ff5255ce290cd2f601be19b7e492755d2f6894f6945b9e
                                                                                                                                                                                            • Instruction ID: e02a2aa7e4d0b84ea6107a4ba352d85fb44e4b2ecd8f511953b2a7c762bbbe68
                                                                                                                                                                                            • Opcode Fuzzy Hash: ffb4a1b8254bdec2d8ff5255ce290cd2f601be19b7e492755d2f6894f6945b9e
                                                                                                                                                                                            • Instruction Fuzzy Hash: A002A421F0D64680FF65AB119C102792695AFA9B90F49863CFD6DCB7D6DE3CE6018323

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            • Executed
                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                            control_flow_graph 0 7ff62ef91710-7ff62ef91724 1 7ff62ef9173e-7ff62ef91742 0->1 2 7ff62ef91726-7ff62ef9173d call 7ff62ef92b30 0->2 4 7ff62ef91744-7ff62ef9174d call 7ff62ef912b0 1->4 5 7ff62ef91768-7ff62ef9178b call 7ff62ef97c20 1->5 13 7ff62ef9175f-7ff62ef91767 4->13 14 7ff62ef9174f-7ff62ef9175a call 7ff62ef92b30 4->14 11 7ff62ef917b9-7ff62ef917d4 call 7ff62ef93fe0 5->11 12 7ff62ef9178d-7ff62ef917b8 call 7ff62ef92890 5->12 20 7ff62ef917ee-7ff62ef91801 call 7ff62efa0914 11->20 21 7ff62ef917d6-7ff62ef917e9 call 7ff62ef92b30 11->21 14->13 26 7ff62ef91823-7ff62ef91827 20->26 27 7ff62ef91803-7ff62ef9181e call 7ff62ef92890 20->27 28 7ff62ef9192f-7ff62ef91932 call 7ff62efa028c 21->28 31 7ff62ef91841-7ff62ef91861 call 7ff62efa5090 26->31 32 7ff62ef91829-7ff62ef91835 call 7ff62ef91050 26->32 37 7ff62ef91927-7ff62ef9192a call 7ff62efa028c 27->37 34 7ff62ef91937-7ff62ef9194e 28->34 41 7ff62ef91882-7ff62ef91888 31->41 42 7ff62ef91863-7ff62ef9187d call 7ff62ef92890 31->42 38 7ff62ef9183a-7ff62ef9183c 32->38 37->28 38->37 44 7ff62ef9188e-7ff62ef91897 41->44 45 7ff62ef91915-7ff62ef91918 call 7ff62efa507c 41->45 49 7ff62ef9191d-7ff62ef91922 42->49 46 7ff62ef918a0-7ff62ef918c2 call 7ff62efa05dc 44->46 45->49 52 7ff62ef918c4-7ff62ef918dc call 7ff62efa0d1c 46->52 53 7ff62ef918f5-7ff62ef918fc 46->53 49->37 58 7ff62ef918de-7ff62ef918e1 52->58 59 7ff62ef918e5-7ff62ef918f3 52->59 55 7ff62ef91903-7ff62ef9190b call 7ff62ef92890 53->55 62 7ff62ef91910 55->62 58->46 61 7ff62ef918e3 58->61 59->55 61->62 62->45
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Message
                                                                                                                                                                                            • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc$pyi_arch_extract2fs was called before temporary directory was initialized!
                                                                                                                                                                                            • API String ID: 2030045667-3833288071
                                                                                                                                                                                            • Opcode ID: 202a9cc2caf69a4251a257299f1ac6d1c4b6d513d8ec2d398335697bdcec1e3f
                                                                                                                                                                                            • Instruction ID: f8295395b1de665cd4ab084f2bd62497fe749862e3ded4b777a73c51d8e2201a
                                                                                                                                                                                            • Opcode Fuzzy Hash: 202a9cc2caf69a4251a257299f1ac6d1c4b6d513d8ec2d398335697bdcec1e3f
                                                                                                                                                                                            • Instruction Fuzzy Hash: 63518C61F0964286FF109F11EC602B96391BF69794F848439FE8C87796EE3CE7458712

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _fread_nolock$Message
                                                                                                                                                                                            • String ID: Could not allocate buffer for TOC!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$fread$fseek$malloc
                                                                                                                                                                                            • API String ID: 677216364-1384898525
                                                                                                                                                                                            • Opcode ID: d35244146745b8b618bf98b790668eeb4b23c887bf1dd9afcf73500a7417a829
                                                                                                                                                                                            • Instruction ID: 9b6926b3f0d708e27c5ac0ae42f5ecfbd7f69dea106d10102fc9636b633a93db
                                                                                                                                                                                            • Opcode Fuzzy Hash: d35244146745b8b618bf98b790668eeb4b23c887bf1dd9afcf73500a7417a829
                                                                                                                                                                                            • Instruction Fuzzy Hash: 4E51A071B0960286EF24DF28E8501B833A0EF6CB84B55813EEA4CC7B95DE3CE644C746

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            • Executed
                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                            control_flow_graph 266 7ff62ef91000-7ff62ef939d6 call 7ff62efa0060 call 7ff62efa0058 call 7ff62ef987b0 call 7ff62efa0058 call 7ff62ef9bd60 call 7ff62efa53f0 call 7ff62efa5ff8 call 7ff62ef91eb0 284 7ff62ef93b7f 266->284 285 7ff62ef939dc-7ff62ef939ec call 7ff62ef93ed0 266->285 287 7ff62ef93b84-7ff62ef93ba4 call 7ff62ef9bdc0 284->287 285->284 290 7ff62ef939f2-7ff62ef93a05 call 7ff62ef93da0 285->290 290->284 294 7ff62ef93a0b-7ff62ef93a32 call 7ff62ef97b70 290->294 297 7ff62ef93a74-7ff62ef93a9c call 7ff62ef98050 call 7ff62ef91cb0 294->297 298 7ff62ef93a34-7ff62ef93a43 call 7ff62ef97b70 294->298 308 7ff62ef93aa2-7ff62ef93ab8 call 7ff62ef91cb0 297->308 309 7ff62ef93b4d-7ff62ef93b5e 297->309 298->297 304 7ff62ef93a45-7ff62ef93a4b 298->304 306 7ff62ef93a57-7ff62ef93a71 call 7ff62efa507c call 7ff62ef98050 304->306 307 7ff62ef93a4d-7ff62ef93a55 304->307 306->297 307->306 321 7ff62ef93ad7-7ff62ef93ada 308->321 322 7ff62ef93aba-7ff62ef93ad2 call 7ff62ef92b30 308->322 313 7ff62ef93b60-7ff62ef93b67 309->313 314 7ff62ef93bb2-7ff62ef93bb5 309->314 313->314 319 7ff62ef93b69-7ff62ef93b71 call 7ff62ef98980 313->319 317 7ff62ef93bb7-7ff62ef93bbd 314->317 318 7ff62ef93bcb-7ff62ef93be3 call 7ff62ef98be0 314->318 323 7ff62ef93bbf-7ff62ef93bc9 317->323 324 7ff62ef93bfb-7ff62ef93c08 call 7ff62ef96df0 317->324 333 7ff62ef93bee-7ff62ef93bf5 SetDllDirectoryW 318->333 334 7ff62ef93be5-7ff62ef93bec 318->334 335 7ff62ef93b73 319->335 336 7ff62ef93ba5-7ff62ef93ba8 call 7ff62ef914f0 319->336 321->309 331 7ff62ef93adc-7ff62ef93af3 call 7ff62ef93fe0 321->331 322->284 323->318 323->324 341 7ff62ef93c53-7ff62ef93c58 call 7ff62ef96d70 324->341 342 7ff62ef93c0a-7ff62ef93c17 call 7ff62ef96aa0 324->342 344 7ff62ef93af5-7ff62ef93af8 331->344 345 7ff62ef93afa-7ff62ef93b26 call 7ff62ef982c0 331->345 333->324 340 7ff62ef93b7a call 7ff62ef92b30 334->340 335->340 349 7ff62ef93bad-7ff62ef93bb0 336->349 340->284 352 7ff62ef93c5d-7ff62ef93c60 341->352 342->341 357 7ff62ef93c19-7ff62ef93c28 call 7ff62ef96600 342->357 350 7ff62ef93b35-7ff62ef93b4b call 7ff62ef92b30 344->350 345->309 359 7ff62ef93b28-7ff62ef93b30 call 7ff62efa028c 345->359 349->284 349->314 350->284 355 7ff62ef93d06-7ff62ef93d15 call 7ff62ef934c0 352->355 356 7ff62ef93c66-7ff62ef93c70 352->356 355->284 374 7ff62ef93d1b-7ff62ef93d52 call 7ff62ef98950 call 7ff62ef97fe0 call 7ff62ef97b70 call 7ff62ef93620 call 7ff62ef98090 355->374 360 7ff62ef93c73-7ff62ef93c7d 356->360 372 7ff62ef93c49-7ff62ef93c4e call 7ff62ef96850 357->372 373 7ff62ef93c2a-7ff62ef93c36 call 7ff62ef96580 357->373 359->350 365 7ff62ef93c7f-7ff62ef93c84 360->365 366 7ff62ef93c86-7ff62ef93c88 360->366 365->360 365->366 370 7ff62ef93cd1-7ff62ef93d01 call 7ff62ef93620 call 7ff62ef93460 call 7ff62ef93610 call 7ff62ef96850 call 7ff62ef96d70 366->370 371 7ff62ef93c8a-7ff62ef93cad call 7ff62ef91ef0 366->371 370->287 371->284 386 7ff62ef93cb3-7ff62ef93cbd 371->386 372->341 373->372 387 7ff62ef93c38-7ff62ef93c47 call 7ff62ef96c40 373->387 403 7ff62ef93d57-7ff62ef93d74 call 7ff62ef96850 call 7ff62ef96d70 374->403 391 7ff62ef93cc0-7ff62ef93ccf 386->391 387->352 391->370 391->391 409 7ff62ef93d82-7ff62ef93d8c call 7ff62ef91e80 403->409 410 7ff62ef93d76-7ff62ef93d7d call 7ff62ef97d50 403->410 409->287 410->409
                                                                                                                                                                                            APIs
                                                                                                                                                                                              • Part of subcall function 00007FF62EF93ED0: GetModuleFileNameW.KERNEL32(?,00007FF62EF939EA), ref: 00007FF62EF93F01
                                                                                                                                                                                            • SetDllDirectoryW.KERNEL32 ref: 00007FF62EF93BF5
                                                                                                                                                                                              • Part of subcall function 00007FF62EF97B70: GetEnvironmentVariableW.KERNEL32(00007FF62EF93A1F), ref: 00007FF62EF97BAA
                                                                                                                                                                                              • Part of subcall function 00007FF62EF97B70: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF62EF97BC7
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Environment$DirectoryExpandFileModuleNameStringsVariable
                                                                                                                                                                                            • String ID: Cannot open PyInstaller archive from executable (%s) or external archive (%s)$Cannot side-load external archive %s (code %d)!$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$MEI$_MEIPASS2$_PYI_ONEDIR_MODE
                                                                                                                                                                                            • API String ID: 2344891160-1544818733
                                                                                                                                                                                            • Opcode ID: beedfa0e4aec9380ee68f4065108f3e180d6bbf3e2b3c09fc90215d07130c937
                                                                                                                                                                                            • Instruction ID: 98af0813dea5334bfddb1610b5b92da0eaff61bccb6d46b744af10c3791c311e
                                                                                                                                                                                            • Opcode Fuzzy Hash: beedfa0e4aec9380ee68f4065108f3e180d6bbf3e2b3c09fc90215d07130c937
                                                                                                                                                                                            • Instruction Fuzzy Hash: 68B17021E1E68341EF65AF219C512FD6291BFA4784F40813EFA8DC7696EF2CE7058742

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Process_invalid_parameter_noinfo$ByteCharCodeCommandConsoleCreateCtrlExitHandlerInfoLineMultiObjectSingleStartupWaitWide
                                                                                                                                                                                            • String ID: CreateProcessW$Error creating child process!
                                                                                                                                                                                            • API String ID: 2895956056-3524285272
                                                                                                                                                                                            • Opcode ID: 08988cee581fa2f1300347ff32b1d9c8d82b1f49edf068ad7517d4b354b7a22a
                                                                                                                                                                                            • Instruction ID: 6c109513d5267a789193b0c9155c12d8c50058acc82d776c58cd2dc2b1a6f833
                                                                                                                                                                                            • Opcode Fuzzy Hash: 08988cee581fa2f1300347ff32b1d9c8d82b1f49edf068ad7517d4b354b7a22a
                                                                                                                                                                                            • Instruction Fuzzy Hash: A6414132A08B8185DF209B24E8552AAA364FFA43A0F50473DF6AD877D5DF7CD1448B42

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            • Executed
                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                            control_flow_graph 507 7ff62ef91050-7ff62ef910ab call 7ff62ef9b5e0 510 7ff62ef910d3-7ff62ef910eb call 7ff62efa5090 507->510 511 7ff62ef910ad-7ff62ef910d2 call 7ff62ef92b30 507->511 516 7ff62ef91109-7ff62ef91119 call 7ff62efa5090 510->516 517 7ff62ef910ed-7ff62ef91104 call 7ff62ef92890 510->517 523 7ff62ef91137-7ff62ef91147 516->523 524 7ff62ef9111b-7ff62ef91132 call 7ff62ef92890 516->524 522 7ff62ef9126c-7ff62ef91281 call 7ff62ef9b2c0 call 7ff62efa507c * 2 517->522 540 7ff62ef91286-7ff62ef912a0 522->540 525 7ff62ef91150-7ff62ef91175 call 7ff62efa05dc 523->525 524->522 533 7ff62ef9125e 525->533 534 7ff62ef9117b-7ff62ef91185 call 7ff62efa0350 525->534 536 7ff62ef91264 533->536 534->533 541 7ff62ef9118b-7ff62ef91197 534->541 536->522 542 7ff62ef911a0-7ff62ef911c8 call 7ff62ef99a90 541->542 545 7ff62ef91241-7ff62ef9125c call 7ff62ef92b30 542->545 546 7ff62ef911ca-7ff62ef911cd 542->546 545->536 547 7ff62ef911cf-7ff62ef911d9 546->547 548 7ff62ef9123c 546->548 551 7ff62ef91203-7ff62ef91206 547->551 552 7ff62ef911db-7ff62ef911e8 call 7ff62efa0d1c 547->552 548->545 553 7ff62ef91208-7ff62ef91216 call 7ff62ef9cb40 551->553 554 7ff62ef91219-7ff62ef9121e 551->554 558 7ff62ef911ed-7ff62ef911f0 552->558 553->554 554->542 557 7ff62ef91220-7ff62ef91223 554->557 562 7ff62ef91225-7ff62ef91228 557->562 563 7ff62ef91237-7ff62ef9123a 557->563 559 7ff62ef911fe-7ff62ef91201 558->559 560 7ff62ef911f2-7ff62ef911fc call 7ff62efa0350 558->560 559->545 560->554 560->559 562->545 565 7ff62ef9122a-7ff62ef91232 562->565 563->536 565->525
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Message
                                                                                                                                                                                            • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                                                                                                                                                                            • API String ID: 2030045667-2813020118
                                                                                                                                                                                            • Opcode ID: cc23d73744f16382c1a3433e0324b5cd4e8ed3094ad73b42f3534ae5bf402bf4
                                                                                                                                                                                            • Instruction ID: a6845563f1ac5605c6b71aa2643a42bf76dc5bff9b05156be6548589adb90f81
                                                                                                                                                                                            • Opcode Fuzzy Hash: cc23d73744f16382c1a3433e0324b5cd4e8ed3094ad73b42f3534ae5bf402bf4
                                                                                                                                                                                            • Instruction Fuzzy Hash: 7A51C222A0D68285EF20AF51AC503BA6391FFA4794F458139FE8DC7795EE3CE645C702

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            • Executed
                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                            control_flow_graph 638 7ff62efac11c-7ff62efac142 639 7ff62efac144-7ff62efac158 call 7ff62efa55a4 call 7ff62efa55c4 638->639 640 7ff62efac15d-7ff62efac161 638->640 658 7ff62efac54e 639->658 641 7ff62efac537-7ff62efac543 call 7ff62efa55a4 call 7ff62efa55c4 640->641 642 7ff62efac167-7ff62efac16e 640->642 661 7ff62efac549 call 7ff62efaafa4 641->661 642->641 644 7ff62efac174-7ff62efac1a2 642->644 644->641 647 7ff62efac1a8-7ff62efac1af 644->647 650 7ff62efac1b1-7ff62efac1c3 call 7ff62efa55a4 call 7ff62efa55c4 647->650 651 7ff62efac1c8-7ff62efac1cb 647->651 650->661 656 7ff62efac1d1-7ff62efac1d7 651->656 657 7ff62efac533-7ff62efac535 651->657 656->657 662 7ff62efac1dd-7ff62efac1e0 656->662 659 7ff62efac551-7ff62efac568 657->659 658->659 661->658 662->650 665 7ff62efac1e2-7ff62efac207 662->665 667 7ff62efac209-7ff62efac20b 665->667 668 7ff62efac23a-7ff62efac241 665->668 671 7ff62efac232-7ff62efac238 667->671 672 7ff62efac20d-7ff62efac214 667->672 669 7ff62efac243-7ff62efac26b call 7ff62efadcbc call 7ff62efab00c * 2 668->669 670 7ff62efac216-7ff62efac22d call 7ff62efa55a4 call 7ff62efa55c4 call 7ff62efaafa4 668->670 703 7ff62efac288-7ff62efac2b3 call 7ff62efac944 669->703 704 7ff62efac26d-7ff62efac283 call 7ff62efa55c4 call 7ff62efa55a4 669->704 700 7ff62efac3c0 670->700 673 7ff62efac2b8-7ff62efac2cf 671->673 672->670 672->671 677 7ff62efac2d1-7ff62efac2d9 673->677 678 7ff62efac34a-7ff62efac354 call 7ff62efb408c 673->678 677->678 682 7ff62efac2db-7ff62efac2dd 677->682 689 7ff62efac3de 678->689 690 7ff62efac35a-7ff62efac36f 678->690 682->678 686 7ff62efac2df-7ff62efac2f5 682->686 686->678 691 7ff62efac2f7-7ff62efac303 686->691 693 7ff62efac3e3-7ff62efac403 ReadFile 689->693 690->689 695 7ff62efac371-7ff62efac383 GetConsoleMode 690->695 691->678 696 7ff62efac305-7ff62efac307 691->696 698 7ff62efac409-7ff62efac411 693->698 699 7ff62efac4fd-7ff62efac506 GetLastError 693->699 695->689 701 7ff62efac385-7ff62efac38d 695->701 696->678 702 7ff62efac309-7ff62efac321 696->702 698->699 705 7ff62efac417 698->705 708 7ff62efac523-7ff62efac526 699->708 709 7ff62efac508-7ff62efac51e call 7ff62efa55c4 call 7ff62efa55a4 699->709 710 7ff62efac3c3-7ff62efac3cd call 7ff62efab00c 700->710 701->693 707 7ff62efac38f-7ff62efac3b1 ReadConsoleW 701->707 702->678 711 7ff62efac323-7ff62efac32f 702->711 703->673 704->700 714 7ff62efac41e-7ff62efac433 705->714 716 7ff62efac3d2-7ff62efac3dc 707->716 717 7ff62efac3b3 GetLastError 707->717 721 7ff62efac3b9-7ff62efac3bb call 7ff62efa5538 708->721 722 7ff62efac52c-7ff62efac52e 708->722 709->700 710->659 711->678 720 7ff62efac331-7ff62efac333 711->720 714->710 724 7ff62efac435-7ff62efac440 714->724 716->714 717->721 720->678 728 7ff62efac335-7ff62efac345 720->728 721->700 722->710 730 7ff62efac442-7ff62efac45b call 7ff62efabd34 724->730 731 7ff62efac467-7ff62efac46f 724->731 728->678 738 7ff62efac460-7ff62efac462 730->738 734 7ff62efac471-7ff62efac483 731->734 735 7ff62efac4eb-7ff62efac4f8 call 7ff62efabb74 731->735 739 7ff62efac4de-7ff62efac4e6 734->739 740 7ff62efac485 734->740 735->738 738->710 739->710 742 7ff62efac48a-7ff62efac491 740->742 743 7ff62efac493-7ff62efac497 742->743 744 7ff62efac4cd-7ff62efac4d8 742->744 745 7ff62efac4b3 743->745 746 7ff62efac499-7ff62efac4a0 743->746 744->739 747 7ff62efac4b9-7ff62efac4c9 745->747 746->745 748 7ff62efac4a2-7ff62efac4a6 746->748 747->742 749 7ff62efac4cb 747->749 748->745 750 7ff62efac4a8-7ff62efac4b1 748->750 749->739 750->747
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 3215553584-0
                                                                                                                                                                                            • Opcode ID: 35a62c87d622c24e2edb9aadc987597fb4e04b7ba40dc30474cb3f056ab41b60
                                                                                                                                                                                            • Instruction ID: 221fb3932bcfd708a570038505f1c2c5be11c28f8f47cd49e2c06ef001f5bd01
                                                                                                                                                                                            • Opcode Fuzzy Hash: 35a62c87d622c24e2edb9aadc987597fb4e04b7ba40dc30474cb3f056ab41b60
                                                                                                                                                                                            • Instruction Fuzzy Hash: DFC1F222A4CB8685EF609B5598002FD7B91EFA0B80F55413DFA4E8B791DE7CEA458703

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Token$InformationProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 995526605-0
                                                                                                                                                                                            • Opcode ID: 3b4ff29bc97920ba2271d4a1c1e57abe4a5e4b0a83d431c25c67b1407b0ddbe5
                                                                                                                                                                                            • Instruction ID: a7ea1ed0d9359610ef137c4c32197c4820a432d34c1b8c7295c13c15b185fba6
                                                                                                                                                                                            • Opcode Fuzzy Hash: 3b4ff29bc97920ba2271d4a1c1e57abe4a5e4b0a83d431c25c67b1407b0ddbe5
                                                                                                                                                                                            • Instruction Fuzzy Hash: 94213231A0868241DF109F55F85517AA3A0FF957E0F504239FAAC87AE4DE7CE5448702

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            APIs
                                                                                                                                                                                              • Part of subcall function 00007FF62EF98660: GetCurrentProcess.KERNEL32 ref: 00007FF62EF98680
                                                                                                                                                                                              • Part of subcall function 00007FF62EF98660: OpenProcessToken.ADVAPI32 ref: 00007FF62EF98691
                                                                                                                                                                                              • Part of subcall function 00007FF62EF98660: GetTokenInformation.KERNELBASE ref: 00007FF62EF986B6
                                                                                                                                                                                              • Part of subcall function 00007FF62EF98660: GetLastError.KERNEL32 ref: 00007FF62EF986C0
                                                                                                                                                                                              • Part of subcall function 00007FF62EF98660: GetTokenInformation.KERNELBASE ref: 00007FF62EF98700
                                                                                                                                                                                              • Part of subcall function 00007FF62EF98660: ConvertSidToStringSidW.ADVAPI32 ref: 00007FF62EF9871C
                                                                                                                                                                                              • Part of subcall function 00007FF62EF98660: CloseHandle.KERNEL32 ref: 00007FF62EF98734
                                                                                                                                                                                            • LocalFree.KERNEL32(00000000,00007FF62EF93B6E), ref: 00007FF62EF98A0C
                                                                                                                                                                                            • LocalFree.KERNEL32 ref: 00007FF62EF98A15
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Token$FreeInformationLocalProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                                                                                                                                                            • String ID: D:(A;;FA;;;%s)$D:(A;;FA;;;%s)(A;;FA;;;%s)$S-1-3-4$Security descriptor string length exceeds PATH_MAX!
                                                                                                                                                                                            • API String ID: 6828938-1817031585
                                                                                                                                                                                            • Opcode ID: 205b7d1dfb2922ffea14e43b9fff2feb2a6941106c301a2985194d40b60a609a
                                                                                                                                                                                            • Instruction ID: ec8b3d239b1879ffd0dce776bcff37d959c9453ed4e21068fc81aadae39ffc6a
                                                                                                                                                                                            • Opcode Fuzzy Hash: 205b7d1dfb2922ffea14e43b9fff2feb2a6941106c301a2985194d40b60a609a
                                                                                                                                                                                            • Instruction Fuzzy Hash: F7219D22E0868681FF10AF20EC556F92261EF69780F84413AF98EC7696DE3DE6048642

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            • Executed
                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                            control_flow_graph 899 7ff62efad620-7ff62efad645 900 7ff62efad913 899->900 901 7ff62efad64b-7ff62efad64e 899->901 902 7ff62efad915-7ff62efad925 900->902 903 7ff62efad650-7ff62efad682 call 7ff62efaaed8 901->903 904 7ff62efad687-7ff62efad6b3 901->904 903->902 906 7ff62efad6be-7ff62efad6c4 904->906 907 7ff62efad6b5-7ff62efad6bc 904->907 908 7ff62efad6d4-7ff62efad6e9 call 7ff62efb408c 906->908 909 7ff62efad6c6-7ff62efad6cf call 7ff62efac9e0 906->909 907->903 907->906 914 7ff62efad6ef-7ff62efad6f8 908->914 915 7ff62efad803-7ff62efad80c 908->915 909->908 914->915 918 7ff62efad6fe-7ff62efad702 914->918 916 7ff62efad860-7ff62efad885 WriteFile 915->916 917 7ff62efad80e-7ff62efad814 915->917 919 7ff62efad890 916->919 920 7ff62efad887-7ff62efad88d GetLastError 916->920 921 7ff62efad816-7ff62efad819 917->921 922 7ff62efad84c-7ff62efad85e call 7ff62efad0d8 917->922 923 7ff62efad704-7ff62efad70c call 7ff62efa4a00 918->923 924 7ff62efad713-7ff62efad71e 918->924 925 7ff62efad893 919->925 920->919 926 7ff62efad838-7ff62efad84a call 7ff62efad2f8 921->926 927 7ff62efad81b-7ff62efad81e 921->927 940 7ff62efad7f0-7ff62efad7f7 922->940 923->924 929 7ff62efad720-7ff62efad729 924->929 930 7ff62efad72f-7ff62efad744 GetConsoleMode 924->930 932 7ff62efad898 925->932 926->940 933 7ff62efad8a4-7ff62efad8ae 927->933 934 7ff62efad824-7ff62efad836 call 7ff62efad1dc 927->934 929->915 929->930 937 7ff62efad7fc 930->937 938 7ff62efad74a-7ff62efad750 930->938 941 7ff62efad89d 932->941 942 7ff62efad8b0-7ff62efad8b5 933->942 943 7ff62efad90c-7ff62efad911 933->943 934->940 937->915 946 7ff62efad7d9-7ff62efad7eb call 7ff62efacc60 938->946 947 7ff62efad756-7ff62efad759 938->947 940->932 941->933 951 7ff62efad8e3-7ff62efad8ed 942->951 952 7ff62efad8b7-7ff62efad8ba 942->952 943->902 946->940 949 7ff62efad764-7ff62efad772 947->949 950 7ff62efad75b-7ff62efad75e 947->950 956 7ff62efad7d0-7ff62efad7d4 949->956 957 7ff62efad774 949->957 950->941 950->949 954 7ff62efad8ef-7ff62efad8f2 951->954 955 7ff62efad8f4-7ff62efad903 951->955 958 7ff62efad8d3-7ff62efad8de call 7ff62efa5580 952->958 959 7ff62efad8bc-7ff62efad8cb 952->959 954->900 954->955 955->943 956->925 960 7ff62efad778-7ff62efad78f call 7ff62efb4158 957->960 958->951 959->958 965 7ff62efad791-7ff62efad79d 960->965 966 7ff62efad7c7-7ff62efad7cd GetLastError 960->966 967 7ff62efad79f-7ff62efad7b1 call 7ff62efb4158 965->967 968 7ff62efad7bc-7ff62efad7c3 965->968 966->956 967->966 972 7ff62efad7b3-7ff62efad7ba 967->972 968->956 970 7ff62efad7c5 968->970 970->960 972->968
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF62EFAD60B), ref: 00007FF62EFAD73C
                                                                                                                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF62EFAD60B), ref: 00007FF62EFAD7C7
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: ConsoleErrorLastMode
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 953036326-0
                                                                                                                                                                                            • Opcode ID: fbcfe551b9719c6229bed95fc105e51a183c6d2ac5964edc4a317e2464c7d24a
                                                                                                                                                                                            • Instruction ID: 7082be3d0ba992c0dd95771b08445a1b6af4b7b1862ced054b0fe0a3197b9bbe
                                                                                                                                                                                            • Opcode Fuzzy Hash: fbcfe551b9719c6229bed95fc105e51a183c6d2ac5964edc4a317e2464c7d24a
                                                                                                                                                                                            • Instruction Fuzzy Hash: 7991C123E4865285FF608F6598402BD2BA0AB66B8CF54413DEE4E9BB84DF39D641C703

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _get_daylight$_isindst
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 4170891091-0
                                                                                                                                                                                            • Opcode ID: e30f49420ffe1712ec5869c52a61b1ecc0c505d60627fe33813fae1700624dd7
                                                                                                                                                                                            • Instruction ID: 4fd0baedcd90079c6815a8e6f6204eb9c3b062b52648154a48a91065dbc1d2a7
                                                                                                                                                                                            • Opcode Fuzzy Hash: e30f49420ffe1712ec5869c52a61b1ecc0c505d60627fe33813fae1700624dd7
                                                                                                                                                                                            • Instruction Fuzzy Hash: 6A51F173F042118AEF14CB259D856BC67A1AB64358F51023DFD1E8BBE5DF38A602C742
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 2780335769-0
                                                                                                                                                                                            • Opcode ID: 7cecb9a12d6adc5d813f4c9389116544f81f9d0d17ef3f6385b803a39347ee18
                                                                                                                                                                                            • Instruction ID: bb500cef8e2e9990598d9bc2496d4f020e9fd5de5b7b40b190ea3f88d385e98c
                                                                                                                                                                                            • Opcode Fuzzy Hash: 7cecb9a12d6adc5d813f4c9389116544f81f9d0d17ef3f6385b803a39347ee18
                                                                                                                                                                                            • Instruction Fuzzy Hash: 8D516D62F486418AFF14DF71D8903BD23A1AB68B98F148539EE0D8B789DF38D6418712
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1452418845-0
                                                                                                                                                                                            • Opcode ID: 3d27f789a7b910ea95b37f95ae633beb093259f17e851dcbb1d336e671b45e8f
                                                                                                                                                                                            • Instruction ID: 66d7da8a17c734dd0136b18572bbce9d438d54bcd548b90ea3b8e2ea7e4cb5e6
                                                                                                                                                                                            • Opcode Fuzzy Hash: 3d27f789a7b910ea95b37f95ae633beb093259f17e851dcbb1d336e671b45e8f
                                                                                                                                                                                            • Instruction Fuzzy Hash: FA313811E4D60281FF14AFA4AC513F92291AFB5744F44D43DF98DCB2D7CE2CAA048613
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1279662727-0
                                                                                                                                                                                            • Opcode ID: d82536c74c1c179bb7e2097ade32aabeafd499f25a183bbc1212597eee9ee92e
                                                                                                                                                                                            • Instruction ID: 1eadc8e4aab8b03599927fc165f268b151b25f916d41d3c9d1c5ecd6404a7f7c
                                                                                                                                                                                            • Opcode Fuzzy Hash: d82536c74c1c179bb7e2097ade32aabeafd499f25a183bbc1212597eee9ee92e
                                                                                                                                                                                            • Instruction Fuzzy Hash: 6D41B622D1878283EB549B60A9103796360FFA4764F109338F69C4BBD1DF7CE6E48702
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: CreateDirectoryMessage
                                                                                                                                                                                            • String ID: Security descriptor is not initialized!
                                                                                                                                                                                            • API String ID: 73271072-986317556
                                                                                                                                                                                            • Opcode ID: 7287a5cc856ae2fa57a4db52e4db86861a7dba6e4ea9bf89139b42fa57f5051f
                                                                                                                                                                                            • Instruction ID: f7c19fe5f2f9ce66bc1b131b487d94c9bac6afa83d541686b9c78bcb6e2a5d0b
                                                                                                                                                                                            • Opcode Fuzzy Hash: 7287a5cc856ae2fa57a4db52e4db86861a7dba6e4ea9bf89139b42fa57f5051f
                                                                                                                                                                                            • Instruction Fuzzy Hash: 49E06DB1E0C60686EF209F14EC042692290BBAA364F80133CF19CC73E4EF3CD2098B01
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 3215553584-0
                                                                                                                                                                                            • Opcode ID: 7abeb8fe783ee1c87e05308e58bf334fc2d3c30e054771bdd4fe3d83d7422279
                                                                                                                                                                                            • Instruction ID: 271cb0b422c1b360ca4d07f58cd60b1a1e93f404cbfb0302b9d41e34410b8ec9
                                                                                                                                                                                            • Opcode Fuzzy Hash: 7abeb8fe783ee1c87e05308e58bf334fc2d3c30e054771bdd4fe3d83d7422279
                                                                                                                                                                                            • Instruction Fuzzy Hash: AE51CA62B4974186FF249E25AC0067A6691BF58BA4F14873CFD6C8BBC5CE3CE6418603
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: ErrorFileLastPointer
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 2976181284-0
                                                                                                                                                                                            • Opcode ID: 1615d75b8a55ba2077c919f2c6a9a881aeaa4cd5e18bf0385e0e14deb18ebfea
                                                                                                                                                                                            • Instruction ID: a270cb66bc8678bfe92b7b953505ce079b27da2a96b4b20560f1b95bd1677f5d
                                                                                                                                                                                            • Opcode Fuzzy Hash: 1615d75b8a55ba2077c919f2c6a9a881aeaa4cd5e18bf0385e0e14deb18ebfea
                                                                                                                                                                                            • Instruction Fuzzy Hash: 2D11B261A08A8181DF108B25A8040B96361BB54BF4F540339FE7D8B7D9CF7CD2518742
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF62EFA5A11), ref: 00007FF62EFA5B2F
                                                                                                                                                                                            • SystemTimeToTzSpecificLocalTime.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF62EFA5A11), ref: 00007FF62EFA5B45
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Time$System$FileLocalSpecific
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1707611234-0
                                                                                                                                                                                            • Opcode ID: bb6c187991dbf4b757a25256d017e3a2e1c80456cbfa3cced84e316cd19fd1ad
                                                                                                                                                                                            • Instruction ID: 950cd8e014ccd2cbf13042d46cf5c2f320099b5bd20fbceca13155b8f12d9c4c
                                                                                                                                                                                            • Opcode Fuzzy Hash: bb6c187991dbf4b757a25256d017e3a2e1c80456cbfa3cced84e316cd19fd1ad
                                                                                                                                                                                            • Instruction Fuzzy Hash: B9117372A0C64285EF548F15A85117EB7A0FBA47B1F50123DF69DCAAD8EF2CE254CB01
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • RtlFreeHeap.NTDLL(?,?,?,00007FF62EFB3492,?,?,?,00007FF62EFB34CF,?,?,00000000,00007FF62EFB3995,?,?,00000000,00007FF62EFB38C7), ref: 00007FF62EFAB022
                                                                                                                                                                                            • GetLastError.KERNEL32(?,?,?,00007FF62EFB3492,?,?,?,00007FF62EFB34CF,?,?,00000000,00007FF62EFB3995,?,?,00000000,00007FF62EFB38C7), ref: 00007FF62EFAB02C
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: ErrorFreeHeapLast
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 485612231-0
                                                                                                                                                                                            • Opcode ID: fe06ab376566ea2509a2ed287c19ad9540726c08df5295ae3f1b105c90e4bdc3
                                                                                                                                                                                            • Instruction ID: 360b464ebcf400dc70d3b1b8efd84ef51dd48d98fa36bbcbd99d56d25b65c935
                                                                                                                                                                                            • Opcode Fuzzy Hash: fe06ab376566ea2509a2ed287c19ad9540726c08df5295ae3f1b105c90e4bdc3
                                                                                                                                                                                            • Instruction Fuzzy Hash: 51E0C251F4820286FF28ABF25C6503815915FFCB41F44843CFC1DCB392DE2CAA894623
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • CloseHandle.KERNELBASE(?,?,?,00007FF62EFAB099,?,?,00000000,00007FF62EFAB14E), ref: 00007FF62EFAB28A
                                                                                                                                                                                            • GetLastError.KERNEL32(?,?,?,00007FF62EFAB099,?,?,00000000,00007FF62EFAB14E), ref: 00007FF62EFAB294
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: CloseErrorHandleLast
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 918212764-0
                                                                                                                                                                                            • Opcode ID: 5686df961ce5be01fcc4af8e545b06247c6cca85e683b4a0316bb757e052fe91
                                                                                                                                                                                            • Instruction ID: ec9ab3bdcc352d2e7ccfdb5b269368bc5a84fc5d89025b9a2b4b54a1eba27b70
                                                                                                                                                                                            • Opcode Fuzzy Hash: 5686df961ce5be01fcc4af8e545b06247c6cca85e683b4a0316bb757e052fe91
                                                                                                                                                                                            • Instruction Fuzzy Hash: 4821C321F5C68201FFA197619C6527D12C39FA47A0F44423EFA1ECB7D6DE6CA6458303
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 3215553584-0
                                                                                                                                                                                            • Opcode ID: 6b5c5ab8eeff71e39afe9fda2295d49407cb2b42678b128b0c7397afbf7fbff2
                                                                                                                                                                                            • Instruction ID: 44ed7649211fb19b7c47f44bd0f31d93456fa0e72910192c966c9a9483af8443
                                                                                                                                                                                            • Opcode Fuzzy Hash: 6b5c5ab8eeff71e39afe9fda2295d49407cb2b42678b128b0c7397afbf7fbff2
                                                                                                                                                                                            • Instruction Fuzzy Hash: EA41C372A4864187EF24DB29E9401B973A1EF69785F101139F68ECB790CF2CE602C753
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _fread_nolock
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 840049012-0
                                                                                                                                                                                            • Opcode ID: 6884bf44cf89be0efd3992f3c073b3ff98f594fcc0bdecf54de44da706f2fe23
                                                                                                                                                                                            • Instruction ID: 207a1cba87a31c70517fbcba00ee187b0864c37f93a2afe0302f4c7eeac7d5f6
                                                                                                                                                                                            • Opcode Fuzzy Hash: 6884bf44cf89be0efd3992f3c073b3ff98f594fcc0bdecf54de44da706f2fe23
                                                                                                                                                                                            • Instruction Fuzzy Hash: 7E21D621B0829245FF509E12AD047BAA651BF59BC4F889438FE8D8B786DE7DE601C602
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 3215553584-0
                                                                                                                                                                                            • Opcode ID: 991c086762b97ce1bf58a0820ab8ed553d2cc556ed1ebb985c1376564fde346c
                                                                                                                                                                                            • Instruction ID: 55e14d57b205653f797241c3dc766e2e469cee99800a0f25ff8aa338fc27c98f
                                                                                                                                                                                            • Opcode Fuzzy Hash: 991c086762b97ce1bf58a0820ab8ed553d2cc556ed1ebb985c1376564fde346c
                                                                                                                                                                                            • Instruction Fuzzy Hash: 9931BE22A5864289FF41AF558C013BC2A50AFA4BA4F41423DFA1CCF3D2DEBCE6418713
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 3215553584-0
                                                                                                                                                                                            • Opcode ID: c06f943cf2cfad6cae40bb945918742757c954c3eb67e691afc5a150f41a7f23
                                                                                                                                                                                            • Instruction ID: 7d8eed7ea6cc5d98de1ed7e68e9d2a9c71d3f83e1a7388a040a76ca6a1108102
                                                                                                                                                                                            • Opcode Fuzzy Hash: c06f943cf2cfad6cae40bb945918742757c954c3eb67e691afc5a150f41a7f23
                                                                                                                                                                                            • Instruction Fuzzy Hash: 98116372A5C64185EF60BF519C01279B264BFA4B84F454439FA8D8F79ADF3CD6408703
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 3215553584-0
                                                                                                                                                                                            • Opcode ID: 513e03f871098e076a65fb8bab8bb253d597a6200523e68a4e261718b8ca4e46
                                                                                                                                                                                            • Instruction ID: 8f654713a1a331ad174badd4c1fbd244b35a347e3725896a846e0ca0f0818fc8
                                                                                                                                                                                            • Opcode Fuzzy Hash: 513e03f871098e076a65fb8bab8bb253d597a6200523e68a4e261718b8ca4e46
                                                                                                                                                                                            • Instruction Fuzzy Hash: 03216F32A18A8186DF619F18E84077977A0EBA8B54F15423CFA5DC77D9DF3CD9058B01
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 3215553584-0
                                                                                                                                                                                            • Opcode ID: e4e6805aeaf9884a68cba76bd798531beecc2a98c7129b287afec428eebc8cdc
                                                                                                                                                                                            • Instruction ID: 148f97873eab6c4f640d49b33fedeaecb072c925b058c378017679e0abbe283b
                                                                                                                                                                                            • Opcode Fuzzy Hash: e4e6805aeaf9884a68cba76bd798531beecc2a98c7129b287afec428eebc8cdc
                                                                                                                                                                                            • Instruction Fuzzy Hash: D901C861A4874141EF04DB52AD00169A695BFA9FE4F088638FE5C9BFD6CE3DE2014702
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 3215553584-0
                                                                                                                                                                                            • Opcode ID: f73c62597e7360775599b130af8d7787deaeebf14f296c678ba137edcd315959
                                                                                                                                                                                            • Instruction ID: 827751c3d21b354d5dbd0671fe131042011f4b708fea1cf13b0f460f37d39213
                                                                                                                                                                                            • Opcode Fuzzy Hash: f73c62597e7360775599b130af8d7787deaeebf14f296c678ba137edcd315959
                                                                                                                                                                                            • Instruction Fuzzy Hash: 6E018C20E4D64240FF646B21AD519792690AF607D0F14463CFA1DCBBCBEE2CE7418303
                                                                                                                                                                                            APIs
                                                                                                                                                                                              • Part of subcall function 00007FF62EFADCBC: HeapAlloc.KERNEL32(?,?,?,00007FF62EFA0E24,?,?,?,00007FF62EFA2336,?,?,?,?,?,00007FF62EFA3929), ref: 00007FF62EFADCFA
                                                                                                                                                                                            • RtlReAllocateHeap.NTDLL(?,?,00000000,00007FF62EFB3BAB,?,?,?,00007FF62EFAA5E7,?,?,?,00007FF62EFAA4DD,?,?,?,00007FF62EFAA8BE), ref: 00007FF62EFB1029
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Heap$AllocAllocate
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 2177240990-0
                                                                                                                                                                                            • Opcode ID: c3784d4affd970729c7866494d2ca06f7fc2c2015deb2ea0f1f0b3636169893d
                                                                                                                                                                                            • Instruction ID: 1b4f5d97a5a0e6990d98259c3ac283b9c2899fafa75b3231972ccd7cf2e24447
                                                                                                                                                                                            • Opcode Fuzzy Hash: c3784d4affd970729c7866494d2ca06f7fc2c2015deb2ea0f1f0b3636169893d
                                                                                                                                                                                            • Instruction Fuzzy Hash: 4101EC51F49643C4FF646B625D5067A5190AFAC7A0F08863CF92ECB6C6DD2CE6414113
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 3215553584-0
                                                                                                                                                                                            • Opcode ID: f6d2080b1b78402d7abe66b145058d3ba054e314cadcac67310d584db64078aa
                                                                                                                                                                                            • Instruction ID: c0c79111ec45fda2afdda00df6433750d9593a18201d9fa29a7da70df3ebe138
                                                                                                                                                                                            • Opcode Fuzzy Hash: f6d2080b1b78402d7abe66b145058d3ba054e314cadcac67310d584db64078aa
                                                                                                                                                                                            • Instruction Fuzzy Hash: 41E0ECA2E8830686FF157AA04D929B811114F34341F104438FA088F3C3EE1CAB859663
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • HeapAlloc.KERNEL32(?,?,00000000,00007FF62EFABAA6,?,?,?,00007FF62EFAAC67,?,?,00000000,00007FF62EFAAF02), ref: 00007FF62EFAF2AD
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: AllocHeap
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 4292702814-0
                                                                                                                                                                                            • Opcode ID: ad72610c1691118a78623675ffb4602911f8d1a0a6f53dbf3f5690a0bb35320a
                                                                                                                                                                                            • Instruction ID: 26338088d5e326d5c6b6cd94d1073d0d6ed9506785e34a9271ab22595bf38580
                                                                                                                                                                                            • Opcode Fuzzy Hash: ad72610c1691118a78623675ffb4602911f8d1a0a6f53dbf3f5690a0bb35320a
                                                                                                                                                                                            • Instruction Fuzzy Hash: 47F0CD1BB8960681FF5456A28C202B852D25F6CB80F4C443CEC1ECF3C1DE2CE6808223
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • HeapAlloc.KERNEL32(?,?,?,00007FF62EFA0E24,?,?,?,00007FF62EFA2336,?,?,?,?,?,00007FF62EFA3929), ref: 00007FF62EFADCFA
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: AllocHeap
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 4292702814-0
                                                                                                                                                                                            • Opcode ID: 7e0b1927fbdc3a6ed72285cdcbe6a9dc307cd073e663e3b2fd931ce122d4be7c
                                                                                                                                                                                            • Instruction ID: 6652bde5a0ada3b4bfa6535d0f9b1cb688203a2ff3f79d1d51fd580221d4d37f
                                                                                                                                                                                            • Opcode Fuzzy Hash: 7e0b1927fbdc3a6ed72285cdcbe6a9dc307cd073e663e3b2fd931ce122d4be7c
                                                                                                                                                                                            • Instruction Fuzzy Hash: F4F08C02F8D24795FF546A629C1027512A05FA97A9F08463CFC2ECF3C1DE6EE6408223
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: AddressProc
                                                                                                                                                                                            • String ID: Failed to get address for Tcl_Alloc$Failed to get address for Tcl_ConditionFinalize$Failed to get address for Tcl_ConditionNotify$Failed to get address for Tcl_ConditionWait$Failed to get address for Tcl_CreateInterp$Failed to get address for Tcl_CreateObjCommand$Failed to get address for Tcl_CreateThread$Failed to get address for Tcl_DeleteInterp$Failed to get address for Tcl_DoOneEvent$Failed to get address for Tcl_EvalEx$Failed to get address for Tcl_EvalFile$Failed to get address for Tcl_EvalObjv$Failed to get address for Tcl_Finalize$Failed to get address for Tcl_FinalizeThread$Failed to get address for Tcl_FindExecutable$Failed to get address for Tcl_Free$Failed to get address for Tcl_GetCurrentThread$Failed to get address for Tcl_GetObjResult$Failed to get address for Tcl_GetString$Failed to get address for Tcl_GetVar2$Failed to get address for Tcl_Init$Failed to get address for Tcl_MutexLock$Failed to get address for Tcl_MutexUnlock$Failed to get address for Tcl_NewByteArrayObj$Failed to get address for Tcl_NewStringObj$Failed to get address for Tcl_SetVar2$Failed to get address for Tcl_SetVar2Ex$Failed to get address for Tcl_ThreadAlert$Failed to get address for Tcl_ThreadQueueEvent$Failed to get address for Tk_GetNumMainWindows$Failed to get address for Tk_Init$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                                                                                                                                                                                            • API String ID: 190572456-2208601799
                                                                                                                                                                                            • Opcode ID: 08011e4291223f8c8b87355f84bdba84e3d11561fc99f88d49761070ad3606f6
                                                                                                                                                                                            • Instruction ID: 198bc0cca9633120aebd46f350531da45d95da37ce6cdb8e34dfd2ef8e41f252
                                                                                                                                                                                            • Opcode Fuzzy Hash: 08011e4291223f8c8b87355f84bdba84e3d11561fc99f88d49761070ad3606f6
                                                                                                                                                                                            • Instruction Fuzzy Hash: 51E1C065E1DB4391FF19CF04AC5417423A5AF697C4B95A43DE84E8B2A4FF7DA3488203
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: MessageSend$Window$Create$Move$ObjectSelect$#380BaseClientDialogDrawFontIndirectInfoParametersRectReleaseSystemTextUnits
                                                                                                                                                                                            • String ID: BUTTON$Close$EDIT$Failed to execute script '%ls' due to unhandled exception: %ls$STATIC
                                                                                                                                                                                            • API String ID: 2446303242-1601438679
                                                                                                                                                                                            • Opcode ID: 2b11bbb19a83a086465840dcd7a103c40d81e06c4cc6566eb68c4ee1e4e9da55
                                                                                                                                                                                            • Instruction ID: d5619d9c128482b64ce26db93dda9b082d9dffba6bcd301cd08d42fa466b3d54
                                                                                                                                                                                            • Opcode Fuzzy Hash: 2b11bbb19a83a086465840dcd7a103c40d81e06c4cc6566eb68c4ee1e4e9da55
                                                                                                                                                                                            • Instruction Fuzzy Hash: 22A15A76618B8587EB148F11E86479AB770F788B84F508139EB9D47B24DF3DE264CB40
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                                                                                                                                                                                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                                                                                                            • API String ID: 808467561-2761157908
                                                                                                                                                                                            • Opcode ID: 1922c43916b7ae2b1956b00aa5dfceaf9999fbe18ebc65017c42f663bf9222a2
                                                                                                                                                                                            • Instruction ID: aa54f6709c029be242ed11b96f26447314f2bdd6b74ca1a6e649744d741456aa
                                                                                                                                                                                            • Opcode Fuzzy Hash: 1922c43916b7ae2b1956b00aa5dfceaf9999fbe18ebc65017c42f663bf9222a2
                                                                                                                                                                                            • Instruction Fuzzy Hash: 46B29872E182928BEB658E64D9407FD77A2FB68784F50513DEA0D97A84DF3CE7008B41
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • GetLastError.KERNEL32(00000000,00007FF62EF92A5E,?,?,?,?,?,?,?,?,?,?,?,00007FF62EF9101D), ref: 00007FF62EF98597
                                                                                                                                                                                            • FormatMessageW.KERNEL32 ref: 00007FF62EF985C6
                                                                                                                                                                                            • WideCharToMultiByte.KERNEL32 ref: 00007FF62EF9861C
                                                                                                                                                                                              • Part of subcall function 00007FF62EF929E0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF62EF988F2,?,?,?,?,?,?,?,?,?,?,?,00007FF62EF9101D), ref: 00007FF62EF92A14
                                                                                                                                                                                              • Part of subcall function 00007FF62EF929E0: MessageBoxW.USER32 ref: 00007FF62EF92AF0
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: ErrorLastMessage$ByteCharFormatMultiWide
                                                                                                                                                                                            • String ID: Failed to encode wchar_t as UTF-8.$FormatMessageW$No error messages generated.$PyInstaller: FormatMessageW failed.$PyInstaller: pyi_win32_utils_to_utf8 failed.$WideCharToMultiByte
                                                                                                                                                                                            • API String ID: 2920928814-2573406579
                                                                                                                                                                                            • Opcode ID: f8b909e9681ff6aa95198e912ee695dc1f7db9a724790c30e57e4941c2966439
                                                                                                                                                                                            • Instruction ID: d139e5ac47506c732d156cdb57a401b4b1c479d9ac2e8700825c5afa8183c599
                                                                                                                                                                                            • Opcode Fuzzy Hash: f8b909e9681ff6aa95198e912ee695dc1f7db9a724790c30e57e4941c2966439
                                                                                                                                                                                            • Instruction Fuzzy Hash: DE213C71A18A4281EF649F11EC542B96265BBAC784F84403DF68DC76A5EF3CE6458702
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 3140674995-0
                                                                                                                                                                                            • Opcode ID: be1c9f70274c1bfa0c57ec5397cb0351ad5ab78a1ed88338b70abc701b0ce300
                                                                                                                                                                                            • Instruction ID: 2912da601e7c181bed2389e99cf1545751e89709115465a983ff5ddc23b332cd
                                                                                                                                                                                            • Opcode Fuzzy Hash: be1c9f70274c1bfa0c57ec5397cb0351ad5ab78a1ed88338b70abc701b0ce300
                                                                                                                                                                                            • Instruction Fuzzy Hash: C3315072A08B818AEB609F60E8503ED7364FB94744F44443EEA8D87B94DF38D748C715
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1239891234-0
                                                                                                                                                                                            • Opcode ID: 008726ea591ffa8193f39527e8fee48c852db3d8167e5981d4ed2afc12fe266b
                                                                                                                                                                                            • Instruction ID: be5da5f419ce93e3374b04fbe076d27d386afa882cf288af11d2f8201bf821fe
                                                                                                                                                                                            • Opcode Fuzzy Hash: 008726ea591ffa8193f39527e8fee48c852db3d8167e5981d4ed2afc12fe266b
                                                                                                                                                                                            • Instruction Fuzzy Hash: A2315F32618F8185EF60CF25E8502AE73A4FB99754F504139EA8D87BA4DF38D655CB01
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: FileFindFirst_invalid_parameter_noinfo
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 2227656907-0
                                                                                                                                                                                            • Opcode ID: 99e62b62205f6f1247891fef44c3d84ab051c8482e1ee44e82008766d3ad9720
                                                                                                                                                                                            • Instruction ID: 05b2a64eb4e1c2551e2eb98efe2b96ac08f04a03bfffe86d1447289291caa568
                                                                                                                                                                                            • Opcode Fuzzy Hash: 99e62b62205f6f1247891fef44c3d84ab051c8482e1ee44e82008766d3ad9720
                                                                                                                                                                                            • Instruction Fuzzy Hash: 64B1A222F1869641FF649B21AC141B96351EBA8BD4F44413DFE5E8BBC9DE3CE641C302
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 2933794660-0
                                                                                                                                                                                            • Opcode ID: b9418945c21ca9359366919164a8697e450450899f1773ca7228eb8eaa6a9b3b
                                                                                                                                                                                            • Instruction ID: 621de47ce123133b548474b8b447f3118ba8fa6276700269e184b0decee5e5cd
                                                                                                                                                                                            • Opcode Fuzzy Hash: b9418945c21ca9359366919164a8697e450450899f1773ca7228eb8eaa6a9b3b
                                                                                                                                                                                            • Instruction Fuzzy Hash: 79111C22B54B0589EF00CF60EC552B933A4FB69758F441E39EA6D877A4DF78D2948381
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: memcpy_s
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1502251526-0
                                                                                                                                                                                            • Opcode ID: 723df14fe8405c9280d13974b9e0b256372cd2939c4def8ecbac686ef57d643c
                                                                                                                                                                                            • Instruction ID: fdf504ca24c6ce47678c0aaa05850310fa3466c10d0d7321886b71a6a967c025
                                                                                                                                                                                            • Opcode Fuzzy Hash: 723df14fe8405c9280d13974b9e0b256372cd2939c4def8ecbac686ef57d643c
                                                                                                                                                                                            • Instruction Fuzzy Hash: 0CC1F772F1868587DB24CF15A54466AB791F7A8784F45813DEB4E87B84EF3CEA01CB00
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: ExceptionRaise_clrfp
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 15204871-0
                                                                                                                                                                                            • Opcode ID: 9ceb1b6cde6f3b2eda1c2fc70bd7e1e7d126a653b4f6510e73c9dfb920cedcd9
                                                                                                                                                                                            • Instruction ID: f1948b3109db0c40dfe77afc2eb030f39f1ef5ebb0cc4e0e0234424b613ce752
                                                                                                                                                                                            • Opcode Fuzzy Hash: 9ceb1b6cde6f3b2eda1c2fc70bd7e1e7d126a653b4f6510e73c9dfb920cedcd9
                                                                                                                                                                                            • Instruction Fuzzy Hash: D1B14C73A04B898AEF55CF29C84636837A0F798B48F198939EA5D837A4CF3AD551C701
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Find$CloseFileFirst
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 2295610775-0
                                                                                                                                                                                            • Opcode ID: 8cbeafd55435480eb4b41ebb52a05d3ef2c4ced4829aa63b63a0783ab33de0ca
                                                                                                                                                                                            • Instruction ID: d7585ef3ecb77351f6b7aaaced062f5b3fb8690a9ec51680e2494da835d0d5ca
                                                                                                                                                                                            • Opcode Fuzzy Hash: 8cbeafd55435480eb4b41ebb52a05d3ef2c4ced4829aa63b63a0783ab33de0ca
                                                                                                                                                                                            • Instruction Fuzzy Hash: BBF0A472A1878186FB608F60E8597AA7350BB94724F04473DE6AD436D4DF3CD2088A00
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID: $
                                                                                                                                                                                            • API String ID: 0-227171996
                                                                                                                                                                                            • Opcode ID: c4872f1e0598d0dbbdaab36ff9640d642bec52225eb732dc17c9982f250c6bea
                                                                                                                                                                                            • Instruction ID: 0b0f22653062b14e98f9f15735468be76c4e8b257a87bfc06ca1819a08ea7a1a
                                                                                                                                                                                            • Opcode Fuzzy Hash: c4872f1e0598d0dbbdaab36ff9640d642bec52225eb732dc17c9982f250c6bea
                                                                                                                                                                                            • Instruction Fuzzy Hash: B8E1B432A5A64682EF688E298C5013D33A0FF65B48F14413DEE0E8B794DF39EA51C743
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID: e+000$gfff
                                                                                                                                                                                            • API String ID: 0-3030954782
                                                                                                                                                                                            • Opcode ID: dcea56467776434e5e52420c9f77f7819282e5f197dea1188040280776680b59
                                                                                                                                                                                            • Instruction ID: 50806bab49b71fe7259e4485c0fa067793d2b55add9200187b307dc00e17bbf1
                                                                                                                                                                                            • Opcode Fuzzy Hash: dcea56467776434e5e52420c9f77f7819282e5f197dea1188040280776680b59
                                                                                                                                                                                            • Instruction Fuzzy Hash: E2515922B186D586EB248E35DC007797791E764B94F488239EBAC8BBC5EF3DD1848703
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID: gfffffff
                                                                                                                                                                                            • API String ID: 0-1523873471
                                                                                                                                                                                            • Opcode ID: da57d4f04fe3a59080078ae7a8b70c1646e0beb0550e210eb96496c016bfbe06
                                                                                                                                                                                            • Instruction ID: c31ec478b5ecb06ef182531fc780c475e383fdfb2bd41ffe8347093877323083
                                                                                                                                                                                            • Opcode Fuzzy Hash: da57d4f04fe3a59080078ae7a8b70c1646e0beb0550e210eb96496c016bfbe06
                                                                                                                                                                                            • Instruction Fuzzy Hash: 01A13863B087C586EF21CF25A8107AD7B95AB65784F048139EE8D8B781EE3DE641C703
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                            • String ID: TMP
                                                                                                                                                                                            • API String ID: 3215553584-3125297090
                                                                                                                                                                                            • Opcode ID: 6bb15cbe4657172ddd7e0fa46d069293c0227c56119c162c6aa146f338850863
                                                                                                                                                                                            • Instruction ID: 0ab3f5111456e623ecdfe20e03e5e3d7a75286eb8a4f7d0bb39cbc0ad04b2e73
                                                                                                                                                                                            • Opcode Fuzzy Hash: 6bb15cbe4657172ddd7e0fa46d069293c0227c56119c162c6aa146f338850863
                                                                                                                                                                                            • Instruction Fuzzy Hash: 82518E11F4868241FF64AA269D1917A5391AFA8FC4F18403DEE4DCB7D6EE7CE7018283
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: HeapProcess
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 54951025-0
                                                                                                                                                                                            • Opcode ID: 7569e3696a4862237eb2d75a5d3254d27d2728382b8d3a4fb7a9071d2e6cb06f
                                                                                                                                                                                            • Instruction ID: c407d1200a0c6912bf65d99d6065656b24d418fb16a34b34c7c2acd2a4acfce7
                                                                                                                                                                                            • Opcode Fuzzy Hash: 7569e3696a4862237eb2d75a5d3254d27d2728382b8d3a4fb7a9071d2e6cb06f
                                                                                                                                                                                            • Instruction Fuzzy Hash: 35B09224F07A46C6EF482B11AC8621822A97F6C700FA4403CD14C82320DE2C26B64712
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                            • Opcode ID: e1b45cc5b539c2f4a44f5a431b63c23698d5cd8cc6c74fd81da4f2666c4fe2f5
                                                                                                                                                                                            • Instruction ID: 99a408c0c23f6cbda454556bcc8bcc9e0388202e7fe491b298e3615aed3e9768
                                                                                                                                                                                            • Opcode Fuzzy Hash: e1b45cc5b539c2f4a44f5a431b63c23698d5cd8cc6c74fd81da4f2666c4fe2f5
                                                                                                                                                                                            • Instruction Fuzzy Hash: D6D1E426A4965286EF788E25884027D27A1FF25B48F14423DEE0D8B7D5DF3DEA45C343
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                            • Opcode ID: 84ec6a3f320757ef13b53a77f9400a9296092c401b576f7c6112a1c9e532824b
                                                                                                                                                                                            • Instruction ID: 681a602df338867e4b1d07fd67b0a0fc3befd3994fa56791376afabbfc774e7b
                                                                                                                                                                                            • Opcode Fuzzy Hash: 84ec6a3f320757ef13b53a77f9400a9296092c401b576f7c6112a1c9e532824b
                                                                                                                                                                                            • Instruction Fuzzy Hash: 4DC1C1722141E04BD6C9EB29E85957A33E1F7D830DBD4803AEB8B47B89CA3CE514DB11
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                            • Opcode ID: 4004e6f7831e6380f0c7a9c187e4f56c2fba6a50471e57e5591c0e9cd6f9eb67
                                                                                                                                                                                            • Instruction ID: eea47321842a3755788b7e2e9d515712660794cf169de35929a927d6c73262c6
                                                                                                                                                                                            • Opcode Fuzzy Hash: 4004e6f7831e6380f0c7a9c187e4f56c2fba6a50471e57e5591c0e9cd6f9eb67
                                                                                                                                                                                            • Instruction Fuzzy Hash: 8DB16E72A4978585EB658F29C85023D3BA0E76AF48F284139EB4E8B395CF39D641C743
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                            • Opcode ID: 84378e74e3abe4b2e50357a3cae6d1c9f133da408f6cd3af500eca0aac5fc0e9
                                                                                                                                                                                            • Instruction ID: 16b91cf102f78d2c1680c258bc064051c747a7f1b51f538ecdb362827d42eb67
                                                                                                                                                                                            • Opcode Fuzzy Hash: 84378e74e3abe4b2e50357a3cae6d1c9f133da408f6cd3af500eca0aac5fc0e9
                                                                                                                                                                                            • Instruction Fuzzy Hash: 0681D572A4878146EB74CF19D8803797691FB65794F14423DEACD8BB85EE3DE6808B02
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 3215553584-0
                                                                                                                                                                                            • Opcode ID: 970fa9c1e70947ae83e04df9520a0fb1810d06995f6d4a160b1c2f03216b318c
                                                                                                                                                                                            • Instruction ID: 18a369f7da335cf5d886b42c3902e772cf65ff497558642b6f8bf96aeadc3e8b
                                                                                                                                                                                            • Opcode Fuzzy Hash: 970fa9c1e70947ae83e04df9520a0fb1810d06995f6d4a160b1c2f03216b318c
                                                                                                                                                                                            • Instruction Fuzzy Hash: 6A61CC22E1C25246FF648A288C507796691AFA87A0F15473EF61DC7BC5EF7DEA408702
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                            • Opcode ID: fa1e8384b8f9ed93a652e40ff1fad70abf09339abefc5cb7d3385a95e3869c9a
                                                                                                                                                                                            • Instruction ID: 37f9ca64b6d98c903c2dd3518ab781c18fae467188496a85b0bbffe64d738587
                                                                                                                                                                                            • Opcode Fuzzy Hash: fa1e8384b8f9ed93a652e40ff1fad70abf09339abefc5cb7d3385a95e3869c9a
                                                                                                                                                                                            • Instruction Fuzzy Hash: 7951AB76B5865185FF248B29C84023937A1EBA4F58F348139EE4D8B794CF7AE943C742
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                            • Opcode ID: 51394bb55acd0354c6b54540f03649d9a1ed653df3d59b65c3bbefa0f3d6b76a
                                                                                                                                                                                            • Instruction ID: 1c1ab005285a8bf467a8347194ff7b510e2672768438139885c74bae5a4f3f25
                                                                                                                                                                                            • Opcode Fuzzy Hash: 51394bb55acd0354c6b54540f03649d9a1ed653df3d59b65c3bbefa0f3d6b76a
                                                                                                                                                                                            • Instruction Fuzzy Hash: C151CCB6A5866181EF248F29C44027833A0EB65F58F254139EE8D8B7D4DF3AED43C752
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                            • Opcode ID: 3c25247ae15e209603ec1042d904b34171e82564d0ea1a98edeaeffe93ffac02
                                                                                                                                                                                            • Instruction ID: 7d95293f35d3870826c2af05d7be85e001aa49c379959f8ac0776134230306b7
                                                                                                                                                                                            • Opcode Fuzzy Hash: 3c25247ae15e209603ec1042d904b34171e82564d0ea1a98edeaeffe93ffac02
                                                                                                                                                                                            • Instruction Fuzzy Hash: 23518436B58651C6FB248B29D45023837A0FB64B58F348139EE4D8B795DF3AEA43C742
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                            • Opcode ID: d4595b9fb9fef9db7488d00d8b5cf28c2737f3b7c2e6c847ec82cdef55389f28
                                                                                                                                                                                            • Instruction ID: 2633110aa6bc6531ad10b8ae633950d4c57a1cb164730dc6512bc7b7bd13b723
                                                                                                                                                                                            • Opcode Fuzzy Hash: d4595b9fb9fef9db7488d00d8b5cf28c2737f3b7c2e6c847ec82cdef55389f28
                                                                                                                                                                                            • Instruction Fuzzy Hash: 8B51B7B6A5865186EF248F29C44033837A1EB64F58F254135EE4C9B794CF3AFA43C752
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                            • Opcode ID: cbef8b130d79a7ad9bd62ede7a83548c92a3f011a0e32d449ba268992e3839f7
                                                                                                                                                                                            • Instruction ID: ff9352dc6441c4496a12dba625ffae1b5dbe4f306659679a348bdb2eb9f253e4
                                                                                                                                                                                            • Opcode Fuzzy Hash: cbef8b130d79a7ad9bd62ede7a83548c92a3f011a0e32d449ba268992e3839f7
                                                                                                                                                                                            • Instruction Fuzzy Hash: 6451C9B675465185EB348F29C44033837A0EB68F58F264135EE4C9B794DF3AEA43C752
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                            • Opcode ID: 8494ecf62f03c1d3943c1d589e4c29644468de266d09ee5189585ab02985f6c2
                                                                                                                                                                                            • Instruction ID: e7aae65d472798bde66ec7d9308743d43bb9b9df61cbb60571d16572eecd6157
                                                                                                                                                                                            • Opcode Fuzzy Hash: 8494ecf62f03c1d3943c1d589e4c29644468de266d09ee5189585ab02985f6c2
                                                                                                                                                                                            • Instruction Fuzzy Hash: EC51B336B5865185FB248B29D84023C37A1EB65B58F344139EE4C9B798CF3AEE53C742
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                            • Opcode ID: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                                                                                                                                                                            • Instruction ID: 64b61b308086772bfcaa27d6b29444c129fcf118db59a3de48f8ac3912e0bcd8
                                                                                                                                                                                            • Opcode Fuzzy Hash: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                                                                                                                                                                            • Instruction Fuzzy Hash: AA419A52DD964A44EF6549184D147B43A809F72FA0D5AA2BCFD999F3C3CD0D6BCB8103
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: ErrorFreeHeapLast
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 485612231-0
                                                                                                                                                                                            • Opcode ID: 31cd351b5f51274dd8503828a69934bfe46d7ad2d0bb53372b1025c8a2dbbe0c
                                                                                                                                                                                            • Instruction ID: cc8962fe1e8157a50cea2dc563f7fd6c4f3eb6e471a15f40951b5808ac09cbb8
                                                                                                                                                                                            • Opcode Fuzzy Hash: 31cd351b5f51274dd8503828a69934bfe46d7ad2d0bb53372b1025c8a2dbbe0c
                                                                                                                                                                                            • Instruction Fuzzy Hash: CE41E672B14A5581FF14CF2ADD141A9B3A1BB58FD0B19A03AEE0DCBB58DE3CD6468341
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                            • Opcode ID: d2b002bbc49f8edc76fb8066870c38d7afee558bd2249c300808c44e7bc92a50
                                                                                                                                                                                            • Instruction ID: 77c3a7e1fbb51dde572604068c05a597aad541812a9dd01fb25221b2628d47d2
                                                                                                                                                                                            • Opcode Fuzzy Hash: d2b002bbc49f8edc76fb8066870c38d7afee558bd2249c300808c44e7bc92a50
                                                                                                                                                                                            • Instruction Fuzzy Hash: B531B432B08B4281EB64DF26A89057E76D5AB94B90F04423CFA5D97BD6DF3CD6018706
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                            • Opcode ID: d9053913a188439c949862f5252d0d96588d6a3198c5220388b8f4d277b857ee
                                                                                                                                                                                            • Instruction ID: f710cc38fd1286cd7bfd16190dba250f1dcda3778710ccfc525e7072f31b4f61
                                                                                                                                                                                            • Opcode Fuzzy Hash: d9053913a188439c949862f5252d0d96588d6a3198c5220388b8f4d277b857ee
                                                                                                                                                                                            • Instruction Fuzzy Hash: 03F04F76B182958AEFA48F2DB8026297BE0E75C380B80803DE689C3E04DA3C91618F15
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                            • Opcode ID: cfc8547ea6af2cfbec2828df990cd3d0a6205bb3f5e3ae253026f3a9dd74dc92
                                                                                                                                                                                            • Instruction ID: cdb4b2902979577a7a552a649ffdfb709067f7ae23a15e0cec62b3ccec4b3708
                                                                                                                                                                                            • Opcode Fuzzy Hash: cfc8547ea6af2cfbec2828df990cd3d0a6205bb3f5e3ae253026f3a9dd74dc92
                                                                                                                                                                                            • Instruction Fuzzy Hash: B0A00121958802D0EF449B11AC600B02260AB65300B914039E04D820A0AF2CA7428202
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: AddressProc
                                                                                                                                                                                            • String ID: Failed to get address for PyConfig_Clear$Failed to get address for PyConfig_InitIsolatedConfig$Failed to get address for PyConfig_Read$Failed to get address for PyConfig_SetBytesString$Failed to get address for PyConfig_SetString$Failed to get address for PyConfig_SetWideStringList$Failed to get address for PyErr_Clear$Failed to get address for PyErr_Fetch$Failed to get address for PyErr_NormalizeException$Failed to get address for PyErr_Occurred$Failed to get address for PyErr_Print$Failed to get address for PyErr_Restore$Failed to get address for PyEval_EvalCode$Failed to get address for PyImport_AddModule$Failed to get address for PyImport_ExecCodeModule$Failed to get address for PyImport_ImportModule$Failed to get address for PyList_Append$Failed to get address for PyMarshal_ReadObjectFromString$Failed to get address for PyMem_RawFree$Failed to get address for PyModule_GetDict$Failed to get address for PyObject_CallFunction$Failed to get address for PyObject_CallFunctionObjArgs$Failed to get address for PyObject_GetAttrString$Failed to get address for PyObject_SetAttrString$Failed to get address for PyObject_Str$Failed to get address for PyPreConfig_InitIsolatedConfig$Failed to get address for PyRun_SimpleStringFlags$Failed to get address for PyStatus_Exception$Failed to get address for PySys_GetObject$Failed to get address for PySys_SetObject$Failed to get address for PyUnicode_AsUTF8$Failed to get address for PyUnicode_Decode$Failed to get address for PyUnicode_DecodeFSDefault$Failed to get address for PyUnicode_FromFormat$Failed to get address for PyUnicode_FromString$Failed to get address for PyUnicode_Join$Failed to get address for PyUnicode_Replace$Failed to get address for Py_DecRef$Failed to get address for Py_DecodeLocale$Failed to get address for Py_ExitStatusException$Failed to get address for Py_Finalize$Failed to get address for Py_InitializeFromConfig$Failed to get address for Py_IsInitialized$Failed to get address for Py_PreInitialize$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
                                                                                                                                                                                            • API String ID: 190572456-4266016200
                                                                                                                                                                                            • Opcode ID: f2f88704c5d1e061734efcee993fe9c6dd7b1185595c7391647c05c7e9d36fbf
                                                                                                                                                                                            • Instruction ID: 1d76cd8104d530810010a535f1e0bec50a5ad52860ccfe91b8f8e0b1787204c7
                                                                                                                                                                                            • Opcode Fuzzy Hash: f2f88704c5d1e061734efcee993fe9c6dd7b1185595c7391647c05c7e9d36fbf
                                                                                                                                                                                            • Instruction Fuzzy Hash: 23126364E4EB0390FF65CF04AC541B523A1AF68794B94A43DE84EC76A4FF7CB7498212
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Message_fread_nolock
                                                                                                                                                                                            • String ID: %s%c%s$Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$\$fread$fseek$malloc
                                                                                                                                                                                            • API String ID: 3065259568-2316137593
                                                                                                                                                                                            • Opcode ID: deb6771cc9a48ec71bdcc21680c84b7852abbd0e36f97817b3c5411d243029e4
                                                                                                                                                                                            • Instruction ID: d2af1d80f5470b5a74ed013ab0ee50b562f2f3ab94e5d3ec55a81d8786ba9ac9
                                                                                                                                                                                            • Opcode Fuzzy Hash: deb6771cc9a48ec71bdcc21680c84b7852abbd0e36f97817b3c5411d243029e4
                                                                                                                                                                                            • Instruction Fuzzy Hash: 76519221B0968345FF20AB15AC516FA6394AF697C4F508039FE8DC7B86EE3CE7458742
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: MoveWindow$ObjectSelect$DrawReleaseText
                                                                                                                                                                                            • String ID: P%
                                                                                                                                                                                            • API String ID: 2147705588-2959514604
                                                                                                                                                                                            • Opcode ID: 7645c0c2d2fce03d3aab2d1fd33ee4a3925b53edade4cf92fedf68089910dc30
                                                                                                                                                                                            • Instruction ID: f89a2a22e85bd84dd4ef6e731b6f0de0483a2211092476d7790f5b0fd6e47704
                                                                                                                                                                                            • Opcode Fuzzy Hash: 7645c0c2d2fce03d3aab2d1fd33ee4a3925b53edade4cf92fedf68089910dc30
                                                                                                                                                                                            • Instruction Fuzzy Hash: 8751F826614BA186DB349F26B4181BAB7A1F7A8B61F004139EBCE83685DF3CD145DB10
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                            • String ID: -$:$f$p$p
                                                                                                                                                                                            • API String ID: 3215553584-2013873522
                                                                                                                                                                                            • Opcode ID: 17c3eaeb34264a701bb66d7ce4ab8a897af2982fe98c3a48157bd34433a5c608
                                                                                                                                                                                            • Instruction ID: 233bcd0de0cb96e4eb79c379a459a2892995c05d40e6403320411ebfdb4706e4
                                                                                                                                                                                            • Opcode Fuzzy Hash: 17c3eaeb34264a701bb66d7ce4ab8a897af2982fe98c3a48157bd34433a5c608
                                                                                                                                                                                            • Instruction Fuzzy Hash: 7012B262E4C24386FF209F15D9546B976A1EBA0755F898039F6898F7C4DF3CE6808B07
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                            • String ID: f$f$p$p$f
                                                                                                                                                                                            • API String ID: 3215553584-1325933183
                                                                                                                                                                                            • Opcode ID: 7160b50ef5c5d9843a5fd5f0d5cd643ebb1f382f7049b3f2f81a6a7c29ab944c
                                                                                                                                                                                            • Instruction ID: 33a4f3c83f6a97a80571879092533f5df73d67614470c62962d3d71b6a83743c
                                                                                                                                                                                            • Opcode Fuzzy Hash: 7160b50ef5c5d9843a5fd5f0d5cd643ebb1f382f7049b3f2f81a6a7c29ab944c
                                                                                                                                                                                            • Instruction Fuzzy Hash: 901284A2E9C14385FF206A14D85467A7391EB60750F894139F69ACB7C4DF3CE680CB23
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Message
                                                                                                                                                                                            • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                                                                                                                                                            • API String ID: 2030045667-3659356012
                                                                                                                                                                                            • Opcode ID: 1863b8893e5d4d868e89776a433bfc216dacffa94a62dd0ba0766e8f3a9f019d
                                                                                                                                                                                            • Instruction ID: 7309cbe8b9f32faa4302c111b6f8ff588e439fe541758a32b8845631691d6137
                                                                                                                                                                                            • Opcode Fuzzy Hash: 1863b8893e5d4d868e89776a433bfc216dacffa94a62dd0ba0766e8f3a9f019d
                                                                                                                                                                                            • Instruction Fuzzy Hash: 28319421F0864346FF249F51AC505BA6390EF687D4F58803AFE8D87A56EE3CE7458702
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                                                                                                                            • String ID: csm$csm$csm
                                                                                                                                                                                            • API String ID: 849930591-393685449
                                                                                                                                                                                            • Opcode ID: 5b2106ab85fd7efcab108e3077ecf48f9db79865e243ba23a6eb4b146be1c4dd
                                                                                                                                                                                            • Instruction ID: 01440885134910623e362a53f417599c3c78cd1a26ab71178446059fa0f10236
                                                                                                                                                                                            • Opcode Fuzzy Hash: 5b2106ab85fd7efcab108e3077ecf48f9db79865e243ba23a6eb4b146be1c4dd
                                                                                                                                                                                            • Instruction Fuzzy Hash: 76E18173A1874186EF209F2599402BD37A4FB65798F14813AFE8D97B95DF38E290C702
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • FreeLibrary.KERNEL32(?,?,?,00007FF62EFAF66A,?,?,00000157381E7E98,00007FF62EFAB417,?,?,?,00007FF62EFAB30E,?,?,?,00007FF62EFA6552), ref: 00007FF62EFAF44C
                                                                                                                                                                                            • GetProcAddress.KERNEL32(?,?,?,00007FF62EFAF66A,?,?,00000157381E7E98,00007FF62EFAB417,?,?,?,00007FF62EFAB30E,?,?,?,00007FF62EFA6552), ref: 00007FF62EFAF458
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: AddressFreeLibraryProc
                                                                                                                                                                                            • String ID: api-ms-$ext-ms-
                                                                                                                                                                                            • API String ID: 3013587201-537541572
                                                                                                                                                                                            • Opcode ID: d9a2a87bd09a281b138f83e486683d1d3e88d7d7cd724ecba9763c018ac5b270
                                                                                                                                                                                            • Instruction ID: ff8bafaca50478b0246ad747994aa5e29487ac4f66b852d1f46163f8ff1b8af8
                                                                                                                                                                                            • Opcode Fuzzy Hash: d9a2a87bd09a281b138f83e486683d1d3e88d7d7cd724ecba9763c018ac5b270
                                                                                                                                                                                            • Instruction Fuzzy Hash: 2D41E023B59B0241EF25CB17AC005B52295BF68BA0F5A853DED1DCF784EE3CE6498306
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF62EF9101D), ref: 00007FF62EF98847
                                                                                                                                                                                            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF62EF9101D), ref: 00007FF62EF9889E
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: ByteCharMultiWide
                                                                                                                                                                                            • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                                                                                                                                                                                            • API String ID: 626452242-27947307
                                                                                                                                                                                            • Opcode ID: 946c277c1fe64d7752950c04badb497d02cc135d75d0a4af96f6f0d747498fb2
                                                                                                                                                                                            • Instruction ID: 050571ae990df786347e6568ce9a91b82ca70ce61f5ced95b3a2b59ec3bb1ac3
                                                                                                                                                                                            • Opcode Fuzzy Hash: 946c277c1fe64d7752950c04badb497d02cc135d75d0a4af96f6f0d747498fb2
                                                                                                                                                                                            • Instruction Fuzzy Hash: BC417432A08B8281EB60DF15BC4017AB7A1FB98794F548139EACD87B95DF3CD655C702
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • WideCharToMultiByte.KERNEL32(?,00007FF62EF939EA), ref: 00007FF62EF98D31
                                                                                                                                                                                              • Part of subcall function 00007FF62EF929E0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF62EF988F2,?,?,?,?,?,?,?,?,?,?,?,00007FF62EF9101D), ref: 00007FF62EF92A14
                                                                                                                                                                                              • Part of subcall function 00007FF62EF929E0: MessageBoxW.USER32 ref: 00007FF62EF92AF0
                                                                                                                                                                                            • WideCharToMultiByte.KERNEL32(?,00007FF62EF939EA), ref: 00007FF62EF98DA5
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: ByteCharMultiWide$ErrorLastMessage
                                                                                                                                                                                            • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                                                                                                                                                                                            • API String ID: 3723044601-27947307
                                                                                                                                                                                            • Opcode ID: df8f2b068844af15c3f6e460c074a8b6e33bcf198047290cefaa6cf113e0804d
                                                                                                                                                                                            • Instruction ID: 578e879af30f3d8d7cf4400dddab44cdd28a1e51066cfa7de0113b0a9004d9a2
                                                                                                                                                                                            • Opcode Fuzzy Hash: df8f2b068844af15c3f6e460c074a8b6e33bcf198047290cefaa6cf113e0804d
                                                                                                                                                                                            • Instruction Fuzzy Hash: 4D218D32B19B4285EF109F16EC400797761AFA9B80F54853EEA8D83795EF3CE6018302
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _invalid_parameter_noinfo$_fread_nolock
                                                                                                                                                                                            • String ID: %s%c%s$ERROR: file already exists but should not: %s$PYINSTALLER_STRICT_UNPACK_MODE$WARNING: file already exists but should not: %s$\
                                                                                                                                                                                            • API String ID: 3231891352-3501660386
                                                                                                                                                                                            • Opcode ID: d6dc29b1e5ea4f64701c265bfdbd8e2963ecb7fcaef475f2f5512d02d8d44555
                                                                                                                                                                                            • Instruction ID: 50b776916e8376f056326dfed2bbfc5ff9aade57067dc14d2eed532cf7ef8ccc
                                                                                                                                                                                            • Opcode Fuzzy Hash: d6dc29b1e5ea4f64701c265bfdbd8e2963ecb7fcaef475f2f5512d02d8d44555
                                                                                                                                                                                            • Instruction Fuzzy Hash: C7518D61E0D34345FF64AF25AD102B962919FA9B80F448539F98DCB7DAEE2CE7048343
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • LoadLibraryExW.KERNEL32(?,?,?,00007FF62EF9E16A,?,?,?,00007FF62EF9DE5C,?,?,00000001,00007FF62EF9DA79), ref: 00007FF62EF9DF3D
                                                                                                                                                                                            • GetLastError.KERNEL32(?,?,?,00007FF62EF9E16A,?,?,?,00007FF62EF9DE5C,?,?,00000001,00007FF62EF9DA79), ref: 00007FF62EF9DF4B
                                                                                                                                                                                            • LoadLibraryExW.KERNEL32(?,?,?,00007FF62EF9E16A,?,?,?,00007FF62EF9DE5C,?,?,00000001,00007FF62EF9DA79), ref: 00007FF62EF9DF75
                                                                                                                                                                                            • FreeLibrary.KERNEL32(?,?,?,00007FF62EF9E16A,?,?,?,00007FF62EF9DE5C,?,?,00000001,00007FF62EF9DA79), ref: 00007FF62EF9DFBB
                                                                                                                                                                                            • GetProcAddress.KERNEL32(?,?,?,00007FF62EF9E16A,?,?,?,00007FF62EF9DE5C,?,?,00000001,00007FF62EF9DA79), ref: 00007FF62EF9DFC7
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                                                                                                                            • String ID: api-ms-
                                                                                                                                                                                            • API String ID: 2559590344-2084034818
                                                                                                                                                                                            • Opcode ID: 9872d352a920fe7d45116cdfab482bad5ae926fb7a0a3cc3bdcd692ff81b7137
                                                                                                                                                                                            • Instruction ID: de2625fed30377ca8160d7fc6589adfc5ac673a01de05b0c2915df701eac2948
                                                                                                                                                                                            • Opcode Fuzzy Hash: 9872d352a920fe7d45116cdfab482bad5ae926fb7a0a3cc3bdcd692ff81b7137
                                                                                                                                                                                            • Instruction Fuzzy Hash: B6310622B1A64294EF119F12AC015742394BFA9BACF29453CFD5D8B790DF3CF2558302
                                                                                                                                                                                            APIs
                                                                                                                                                                                              • Part of subcall function 00007FF62EF98BE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF62EF92ABB), ref: 00007FF62EF98C1A
                                                                                                                                                                                            • ExpandEnvironmentStringsW.KERNEL32(00000000,00007FF62EF979B1,00000000,?,00000000,00000000,?,00007FF62EF9154F), ref: 00007FF62EF9748F
                                                                                                                                                                                              • Part of subcall function 00007FF62EF92B30: MessageBoxW.USER32 ref: 00007FF62EF92C05
                                                                                                                                                                                            Strings
                                                                                                                                                                                            • LOADER: Failed to expand environment variables in the runtime-tmpdir., xrefs: 00007FF62EF974A3
                                                                                                                                                                                            • LOADER: Failed to obtain the absolute path of the runtime-tmpdir., xrefs: 00007FF62EF974EA
                                                                                                                                                                                            • LOADER: Failed to convert runtime-tmpdir to a wide string., xrefs: 00007FF62EF97466
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                                                                                                                                                                                            • String ID: LOADER: Failed to convert runtime-tmpdir to a wide string.$LOADER: Failed to expand environment variables in the runtime-tmpdir.$LOADER: Failed to obtain the absolute path of the runtime-tmpdir.
                                                                                                                                                                                            • API String ID: 1662231829-3498232454
                                                                                                                                                                                            • Opcode ID: 4b3c020fd13166d28c819a7d3267133a3eaacb6fee3cd099781d96b43d4de662
                                                                                                                                                                                            • Instruction ID: 51adc0f18423d2e12f1031a13d902c1c8a3d03bfb033c52be80d6ebae6e625a5
                                                                                                                                                                                            • Opcode Fuzzy Hash: 4b3c020fd13166d28c819a7d3267133a3eaacb6fee3cd099781d96b43d4de662
                                                                                                                                                                                            • Instruction Fuzzy Hash: 4E316551F1D78281FF649F25AD652B95291AFA87C0F44843DFA8EC77D6EE2CE3048602
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF62EF92ABB), ref: 00007FF62EF98C1A
                                                                                                                                                                                              • Part of subcall function 00007FF62EF929E0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF62EF988F2,?,?,?,?,?,?,?,?,?,?,?,00007FF62EF9101D), ref: 00007FF62EF92A14
                                                                                                                                                                                              • Part of subcall function 00007FF62EF929E0: MessageBoxW.USER32 ref: 00007FF62EF92AF0
                                                                                                                                                                                            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF62EF92ABB), ref: 00007FF62EF98CA0
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: ByteCharMultiWide$ErrorLastMessage
                                                                                                                                                                                            • String ID: Failed to decode wchar_t from UTF-8$Failed to get wchar_t buffer size.$MultiByteToWideChar$Out of memory.$win32_utils_from_utf8
                                                                                                                                                                                            • API String ID: 3723044601-876015163
                                                                                                                                                                                            • Opcode ID: 887d82444744575df418bfd41b6e48fc3edc0b171f656e4d5f6c7ee70eb32595
                                                                                                                                                                                            • Instruction ID: 7589b7bd37bd35dcc0d1284a9ee9f00e30b688c8e8934ace5bf69cfd64eb768c
                                                                                                                                                                                            • Opcode Fuzzy Hash: 887d82444744575df418bfd41b6e48fc3edc0b171f656e4d5f6c7ee70eb32595
                                                                                                                                                                                            • Instruction Fuzzy Hash: 79215322B19A4281EF50DF25FC40069A361FBA97C4F584539EB4CC3B69EF3DD6418701
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Value$ErrorLast
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 2506987500-0
                                                                                                                                                                                            • Opcode ID: 314b1dd63a8d17b6b9fe49a3dc008a2d89e42ef813efa06f0dff02a3ee6b6398
                                                                                                                                                                                            • Instruction ID: 227f217b046dddb4afcb2cb80116dda0dfafe66039c8ec42312700096dc7a9b5
                                                                                                                                                                                            • Opcode Fuzzy Hash: 314b1dd63a8d17b6b9fe49a3dc008a2d89e42ef813efa06f0dff02a3ee6b6398
                                                                                                                                                                                            • Instruction Fuzzy Hash: 3F212821E8924241FF69A7665E6113963429FA47B0F15563CF83ECF7DADE2CA6024303
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                                                                                                                            • String ID: CONOUT$
                                                                                                                                                                                            • API String ID: 3230265001-3130406586
                                                                                                                                                                                            • Opcode ID: dc1a3cb66a96e2c92b05876df44f34e6b44b08b84d7dcdae92150d4fed606b6a
                                                                                                                                                                                            • Instruction ID: 77344c9241918c383551f6c9a076b43d83cccf0e75b00edbcea1d254bbb335dc
                                                                                                                                                                                            • Opcode Fuzzy Hash: dc1a3cb66a96e2c92b05876df44f34e6b44b08b84d7dcdae92150d4fed606b6a
                                                                                                                                                                                            • Instruction Fuzzy Hash: 39118E31B18A4286EB508B42EC5433966A0FBACBE4F14423DFA6DC77A4DF3CDA448741
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • GetLastError.KERNEL32(?,?,?,00007FF62EFA55CD,?,?,?,?,00007FF62EFAF2BF,?,?,00000000,00007FF62EFABAA6,?,?,?), ref: 00007FF62EFAB997
                                                                                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,00007FF62EFA55CD,?,?,?,?,00007FF62EFAF2BF,?,?,00000000,00007FF62EFABAA6,?,?,?), ref: 00007FF62EFAB9CD
                                                                                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,00007FF62EFA55CD,?,?,?,?,00007FF62EFAF2BF,?,?,00000000,00007FF62EFABAA6,?,?,?), ref: 00007FF62EFAB9FA
                                                                                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,00007FF62EFA55CD,?,?,?,?,00007FF62EFAF2BF,?,?,00000000,00007FF62EFABAA6,?,?,?), ref: 00007FF62EFABA0B
                                                                                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,00007FF62EFA55CD,?,?,?,?,00007FF62EFAF2BF,?,?,00000000,00007FF62EFABAA6,?,?,?), ref: 00007FF62EFABA1C
                                                                                                                                                                                            • SetLastError.KERNEL32(?,?,?,00007FF62EFA55CD,?,?,?,?,00007FF62EFAF2BF,?,?,00000000,00007FF62EFABAA6,?,?,?), ref: 00007FF62EFABA37
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Value$ErrorLast
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 2506987500-0
                                                                                                                                                                                            • Opcode ID: a3e53971e55013dffcf17e77443189c3ed357d9c3158df5e9d9a6a96d3167597
                                                                                                                                                                                            • Instruction ID: 871b6c20af2b3b309f238d6e8c6309eaf5894e5c19fbee3425f78f13f0657e55
                                                                                                                                                                                            • Opcode Fuzzy Hash: a3e53971e55013dffcf17e77443189c3ed357d9c3158df5e9d9a6a96d3167597
                                                                                                                                                                                            • Instruction Fuzzy Hash: 9C113E21F8864245FF64AB225D6513922519FA87B0F14563CF83ECF7D6EE2CA6014203
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                                                                                                                            • String ID: csm$f
                                                                                                                                                                                            • API String ID: 2395640692-629598281
                                                                                                                                                                                            • Opcode ID: 693f609b9fae876419381cc446d630854629708ee6e32f1efd9795666748e69d
                                                                                                                                                                                            • Instruction ID: aaf5de1d43190bdfecf6dd426a00396cd1bd355be9b17966861aea2b8b75852b
                                                                                                                                                                                            • Opcode Fuzzy Hash: 693f609b9fae876419381cc446d630854629708ee6e32f1efd9795666748e69d
                                                                                                                                                                                            • Instruction Fuzzy Hash: EA51A933A1960286DF14DF15D8046293755FBA5B98F60C138FA8E87745EF39FA41C705
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
                                                                                                                                                                                            • String ID: Unhandled exception in script
                                                                                                                                                                                            • API String ID: 3081866767-2699770090
                                                                                                                                                                                            • Opcode ID: dc070d28aa34fb62a8c81eb4f66bc8c41d302b2675cd07858098f6061cbf7ad4
                                                                                                                                                                                            • Instruction ID: e6b65e242bd7d2aec7635d89feb3f191efbc87bf5b68343e02290a07b2b20ec9
                                                                                                                                                                                            • Opcode Fuzzy Hash: dc070d28aa34fb62a8c81eb4f66bc8c41d302b2675cd07858098f6061cbf7ad4
                                                                                                                                                                                            • Instruction Fuzzy Hash: D7310962A19A8289EF20DF25EC551F96360FF98784F444139FA4D8BB99DF3CD2458702
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • GetLastError.KERNEL32(00000000,00000000,00000000,00007FF62EF988F2,?,?,?,?,?,?,?,?,?,?,?,00007FF62EF9101D), ref: 00007FF62EF92A14
                                                                                                                                                                                              • Part of subcall function 00007FF62EF98570: GetLastError.KERNEL32(00000000,00007FF62EF92A5E,?,?,?,?,?,?,?,?,?,?,?,00007FF62EF9101D), ref: 00007FF62EF98597
                                                                                                                                                                                              • Part of subcall function 00007FF62EF98570: FormatMessageW.KERNEL32 ref: 00007FF62EF985C6
                                                                                                                                                                                              • Part of subcall function 00007FF62EF98BE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF62EF92ABB), ref: 00007FF62EF98C1A
                                                                                                                                                                                            • MessageBoxW.USER32 ref: 00007FF62EF92AF0
                                                                                                                                                                                            • MessageBoxA.USER32 ref: 00007FF62EF92B0C
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Message$ErrorLast$ByteCharFormatMultiWide
                                                                                                                                                                                            • String ID: %s%s: %s$Fatal error detected
                                                                                                                                                                                            • API String ID: 2806210788-2410924014
                                                                                                                                                                                            • Opcode ID: 17bde7baa48798fc9044701dc9e2f5590094afa9c40027f5b89001a931553ba1
                                                                                                                                                                                            • Instruction ID: 96e85eb92a863aff2e6c4740a170dad45ca13a1601c923b0c0ceb02d42c1b269
                                                                                                                                                                                            • Opcode Fuzzy Hash: 17bde7baa48798fc9044701dc9e2f5590094afa9c40027f5b89001a931553ba1
                                                                                                                                                                                            • Instruction Fuzzy Hash: 01311E72A2868291EB30DB10E8516EA6364FB947C4F40813AFACD87A99DF3CD745CB41
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                                                                                                                                            • API String ID: 4061214504-1276376045
                                                                                                                                                                                            • Opcode ID: 6d37f3dc48988a17a5a16ca308b3de1e776b5d3bd2cbadce22e8a62f3d793b7e
                                                                                                                                                                                            • Instruction ID: 7d1e8513f4c2e234b2b33e81032b4ee3d12fc6251fc84baa4a68de9c932a9308
                                                                                                                                                                                            • Opcode Fuzzy Hash: 6d37f3dc48988a17a5a16ca308b3de1e776b5d3bd2cbadce22e8a62f3d793b7e
                                                                                                                                                                                            • Instruction Fuzzy Hash: E1F04F61F09B0291FF108B24EC543796320EFA8BA1F54163DE56E8B6E4DF2CD6498742
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _set_statfp
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1156100317-0
                                                                                                                                                                                            • Opcode ID: a62d4fcbb0970871e45180a1f834c32a3c4d190302dd8db61346826940fa499d
                                                                                                                                                                                            • Instruction ID: faf19756f8071f4efb240d910609862d67e73d6ecfbc4dc1b29212eea7d9c3b2
                                                                                                                                                                                            • Opcode Fuzzy Hash: a62d4fcbb0970871e45180a1f834c32a3c4d190302dd8db61346826940fa499d
                                                                                                                                                                                            • Instruction Fuzzy Hash: B8115436E2CE0341FF55196AEC4637610506F7D370F04463DFEAE8BAEB9E2C6A414116
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • FlsGetValue.KERNEL32(?,?,?,00007FF62EFAAC67,?,?,00000000,00007FF62EFAAF02,?,?,?,?,?,00007FF62EFA31CC), ref: 00007FF62EFABA6F
                                                                                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,00007FF62EFAAC67,?,?,00000000,00007FF62EFAAF02,?,?,?,?,?,00007FF62EFA31CC), ref: 00007FF62EFABA8E
                                                                                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,00007FF62EFAAC67,?,?,00000000,00007FF62EFAAF02,?,?,?,?,?,00007FF62EFA31CC), ref: 00007FF62EFABAB6
                                                                                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,00007FF62EFAAC67,?,?,00000000,00007FF62EFAAF02,?,?,?,?,?,00007FF62EFA31CC), ref: 00007FF62EFABAC7
                                                                                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,00007FF62EFAAC67,?,?,00000000,00007FF62EFAAF02,?,?,?,?,?,00007FF62EFA31CC), ref: 00007FF62EFABAD8
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Value
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 3702945584-0
                                                                                                                                                                                            • Opcode ID: 1e6e5a782a5f01b492f8cacbcb6a8fcb5416b77157f1d6b583dc0ddb18180ab8
                                                                                                                                                                                            • Instruction ID: d84eda676da33dfb7cc3dba7b918bb0f8e984d949808dcd6d4c5c0c464a2bfe2
                                                                                                                                                                                            • Opcode Fuzzy Hash: 1e6e5a782a5f01b492f8cacbcb6a8fcb5416b77157f1d6b583dc0ddb18180ab8
                                                                                                                                                                                            • Instruction Fuzzy Hash: 65116D22F4828241FF689B369D6517911519F643B0F54533CF87DCF7D6DE2CA6018203
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Value
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 3702945584-0
                                                                                                                                                                                            • Opcode ID: e8ff1f6aa748b16705e4ba19835f5286931d9fc51bca771aec8a92ae03e77792
                                                                                                                                                                                            • Instruction ID: 0071e3a2f5e6842ba35cca9b6cdbf7b562507425120060216f868a62587ca900
                                                                                                                                                                                            • Opcode Fuzzy Hash: e8ff1f6aa748b16705e4ba19835f5286931d9fc51bca771aec8a92ae03e77792
                                                                                                                                                                                            • Instruction Fuzzy Hash: F211F521E8924741FF68A6725C211B911815F69370F14563CF87ECF3D2ED2DBA418203
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                            • String ID: verbose
                                                                                                                                                                                            • API String ID: 3215553584-579935070
                                                                                                                                                                                            • Opcode ID: ad3fface7d4b2ce3aa9510f497705372120eac90acd968bb25d3a192cbea6c12
                                                                                                                                                                                            • Instruction ID: 5024ed430bc6c39d6e82ccf3609f27b166c6c2790b5ca5afb1680d71665395e4
                                                                                                                                                                                            • Opcode Fuzzy Hash: ad3fface7d4b2ce3aa9510f497705372120eac90acd968bb25d3a192cbea6c12
                                                                                                                                                                                            • Instruction Fuzzy Hash: F291E232A48A4685FF218F25D85077D37A4AF64B54F86413AEA5E8B3C5DF3CE6458303
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                            • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                                                                                                                                                            • API String ID: 3215553584-1196891531
                                                                                                                                                                                            • Opcode ID: 8562a2ddaa4935eebf24a1799f06cf0f98d553335d1454eb5137ecb29e0aa9bc
                                                                                                                                                                                            • Instruction ID: 9c5078a18a44a8a44cf98cc08d038f5efcd2d551907eb7a32313b3c33c3490b5
                                                                                                                                                                                            • Opcode Fuzzy Hash: 8562a2ddaa4935eebf24a1799f06cf0f98d553335d1454eb5137ecb29e0aa9bc
                                                                                                                                                                                            • Instruction Fuzzy Hash: 2A819072E08202C5FF648F298D1027876A0BB39B84F55803DFA49D7A95DF6DEB019783
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: CallEncodePointerTranslator
                                                                                                                                                                                            • String ID: MOC$RCC
                                                                                                                                                                                            • API String ID: 3544855599-2084237596
                                                                                                                                                                                            • Opcode ID: 93df84ad8f7e49cea4bf2fe45b974ce3ad7a793f20ece70ff6f590e0afe80a83
                                                                                                                                                                                            • Instruction ID: 068733252f00c3d1889a9fe71d05e797794aab605de1ecc407a5c4d9b2a831b2
                                                                                                                                                                                            • Opcode Fuzzy Hash: 93df84ad8f7e49cea4bf2fe45b974ce3ad7a793f20ece70ff6f590e0afe80a83
                                                                                                                                                                                            • Instruction Fuzzy Hash: AD617D37A08B4586EB108F66D8403AD77A0FB58B88F158239EF9D57B95CF38E285C741
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                                                                                                                                            • String ID: csm$csm
                                                                                                                                                                                            • API String ID: 3896166516-3733052814
                                                                                                                                                                                            • Opcode ID: bb0dbae594e6361f888f3677e997f8fccf17b68f1c0f59f7e08c923b6417c7cb
                                                                                                                                                                                            • Instruction ID: 5e5b9872ff6941d8db31259bc9bc143eecc2fe4af40c16bf7925feb4215b050c
                                                                                                                                                                                            • Opcode Fuzzy Hash: bb0dbae594e6361f888f3677e997f8fccf17b68f1c0f59f7e08c923b6417c7cb
                                                                                                                                                                                            • Instruction Fuzzy Hash: 89513D3390834286EF648F16994427977A0FB64B98F15C139EADD87BD5CF3CE6518B02
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Message$ByteCharMultiWide
                                                                                                                                                                                            • String ID: %s%s: %s$Fatal error detected
                                                                                                                                                                                            • API String ID: 1878133881-2410924014
                                                                                                                                                                                            • Opcode ID: 6a476509950944f0bc5995eed920a659af08b50e3adf8d3da3d7a8787779b220
                                                                                                                                                                                            • Instruction ID: 857269ddbabbb097d48f27d23857f0654f738d2f40240eb81171e4da3a749a79
                                                                                                                                                                                            • Opcode Fuzzy Hash: 6a476509950944f0bc5995eed920a659af08b50e3adf8d3da3d7a8787779b220
                                                                                                                                                                                            • Instruction Fuzzy Hash: 8E315672A2868181EB30EB10E8516EA6364FF947C4F40413AF6CD87A99DF3CD705CB41
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • GetModuleFileNameW.KERNEL32(?,00007FF62EF939EA), ref: 00007FF62EF93F01
                                                                                                                                                                                              • Part of subcall function 00007FF62EF929E0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF62EF988F2,?,?,?,?,?,?,?,?,?,?,?,00007FF62EF9101D), ref: 00007FF62EF92A14
                                                                                                                                                                                              • Part of subcall function 00007FF62EF929E0: MessageBoxW.USER32 ref: 00007FF62EF92AF0
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: ErrorFileLastMessageModuleName
                                                                                                                                                                                            • String ID: Failed to convert executable path to UTF-8.$Failed to get executable path.$GetModuleFileNameW
                                                                                                                                                                                            • API String ID: 2581892565-1977442011
                                                                                                                                                                                            • Opcode ID: 4067cf041b03358d9120c4033d5e670654b83d2b71477f60263b0e522fc37818
                                                                                                                                                                                            • Instruction ID: 8a4007025363f1b24af6c7ea3d83585e12d1065a15bc884dc939649be4ba92d1
                                                                                                                                                                                            • Opcode Fuzzy Hash: 4067cf041b03358d9120c4033d5e670654b83d2b71477f60263b0e522fc37818
                                                                                                                                                                                            • Instruction Fuzzy Hash: 97010C21F1A64281FF65AB20EC593B51251AFACB88F40443EF88DC7696EE1CE3458606
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: FileWrite$ConsoleErrorLastOutput
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 2718003287-0
                                                                                                                                                                                            • Opcode ID: ac6203f977c47ba8bc2a8f0cb0d6a0086fe2a36fe5d42d2389b6d07504d3a7ef
                                                                                                                                                                                            • Instruction ID: 4620e025beacf4277ae98487e01bba48874283231f05f3b0ce53878d9f8ae74e
                                                                                                                                                                                            • Opcode Fuzzy Hash: ac6203f977c47ba8bc2a8f0cb0d6a0086fe2a36fe5d42d2389b6d07504d3a7ef
                                                                                                                                                                                            • Instruction Fuzzy Hash: 99D10733B18A4189EB10CF75D8402EC3771FBA5798B448239EE5D9BB99DE39D606C341
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: LongWindow$DialogInvalidateRect
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1956198572-0
                                                                                                                                                                                            • Opcode ID: ecac84c754e5eddc26d74cef75c58701df5fcac281216c238072f9f7c8686c02
                                                                                                                                                                                            • Instruction ID: 56303178237d78737bcaa2b07570fed42a67712918936cb60ecc301f1af0149d
                                                                                                                                                                                            • Opcode Fuzzy Hash: ecac84c754e5eddc26d74cef75c58701df5fcac281216c238072f9f7c8686c02
                                                                                                                                                                                            • Instruction Fuzzy Hash: 77118221F1814682FF549B6AFD456B92291EFA9B80F48C038FA8D87B9ECD2CD6854601
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _get_daylight$_invalid_parameter_noinfo
                                                                                                                                                                                            • String ID: ?
                                                                                                                                                                                            • API String ID: 1286766494-1684325040
                                                                                                                                                                                            • Opcode ID: 191dfcedb039f449dd25ac85e341943daf2aec9882a813766c2fb2958beeaf54
                                                                                                                                                                                            • Instruction ID: 3993c6933638325c7046194bcb43dda6443804d43012c562ea06f591dafc4d63
                                                                                                                                                                                            • Opcode Fuzzy Hash: 191dfcedb039f449dd25ac85e341943daf2aec9882a813766c2fb2958beeaf54
                                                                                                                                                                                            • Instruction Fuzzy Hash: E1410822F1868282FF649B25E80137A5760EBA47A4F14823DFE5C8BBD5DE3CD541C702
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • _invalid_parameter_noinfo.LIBCMT ref: 00007FF62EFA96D6
                                                                                                                                                                                              • Part of subcall function 00007FF62EFAB00C: RtlFreeHeap.NTDLL(?,?,?,00007FF62EFB3492,?,?,?,00007FF62EFB34CF,?,?,00000000,00007FF62EFB3995,?,?,00000000,00007FF62EFB38C7), ref: 00007FF62EFAB022
                                                                                                                                                                                              • Part of subcall function 00007FF62EFAB00C: GetLastError.KERNEL32(?,?,?,00007FF62EFB3492,?,?,?,00007FF62EFB34CF,?,?,00000000,00007FF62EFB3995,?,?,00000000,00007FF62EFB38C7), ref: 00007FF62EFAB02C
                                                                                                                                                                                            • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF62EF9C0E5), ref: 00007FF62EFA96F4
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
                                                                                                                                                                                            • String ID: C:\Users\user\Desktop\Chione.exe
                                                                                                                                                                                            • API String ID: 3580290477-1035816482
                                                                                                                                                                                            • Opcode ID: 88945070a8cc5cba7bbb6804309b980ad8c397b15a896308c4a26de9748459e8
                                                                                                                                                                                            • Instruction ID: 92302cb98c573f9159d87a661c984233b2c2e4eaddad3c89adbb3fbcd6b7b462
                                                                                                                                                                                            • Opcode Fuzzy Hash: 88945070a8cc5cba7bbb6804309b980ad8c397b15a896308c4a26de9748459e8
                                                                                                                                                                                            • Instruction Fuzzy Hash: 26419236A48B1289EF64DF25AC500B927A5EF94794B55403DFE4DCBB85DE3DE640C302
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: ErrorFileLastWrite
                                                                                                                                                                                            • String ID: U
                                                                                                                                                                                            • API String ID: 442123175-4171548499
                                                                                                                                                                                            • Opcode ID: 58f62ff0c7f7b6be9e4ecb54e809448fa16189ed2b231f8d6d1ca058d2495b08
                                                                                                                                                                                            • Instruction ID: 8e35b7814b08e838886db11c2d8639dcdba79e0bb482d65024873761ea64d164
                                                                                                                                                                                            • Opcode Fuzzy Hash: 58f62ff0c7f7b6be9e4ecb54e809448fa16189ed2b231f8d6d1ca058d2495b08
                                                                                                                                                                                            • Instruction Fuzzy Hash: AC418223B19A4185DB20CF25E8443A96760FBA8794F844039EE4DC7798DF3DE541C742
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: CurrentDirectory
                                                                                                                                                                                            • String ID: :
                                                                                                                                                                                            • API String ID: 1611563598-336475711
                                                                                                                                                                                            • Opcode ID: 1316864e558d5ad88bd847ae7f6804120a0c280bdf4ddd6c6a660fb6771ddd24
                                                                                                                                                                                            • Instruction ID: c547ca858f0bb8e1e9fc7a9a888d7c9aad5cf12b2f256c35dfe0ad42d0a3f8ab
                                                                                                                                                                                            • Opcode Fuzzy Hash: 1316864e558d5ad88bd847ae7f6804120a0c280bdf4ddd6c6a660fb6771ddd24
                                                                                                                                                                                            • Instruction Fuzzy Hash: 3A21A763A4868181EF209F12D8542BE73A1FB98B84F564039E69D8B784DF7CEB458743
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Message$ByteCharMultiWide
                                                                                                                                                                                            • String ID: Error detected
                                                                                                                                                                                            • API String ID: 1878133881-3513342764
                                                                                                                                                                                            • Opcode ID: 6f9a1586ca547a3c2f77bf815536a5540435ab6ab19a441e761cc5e7daea12c4
                                                                                                                                                                                            • Instruction ID: 8833d06027aa19be2797f2fb218a36965edfa6c653493ae65678c846563ea0e8
                                                                                                                                                                                            • Opcode Fuzzy Hash: 6f9a1586ca547a3c2f77bf815536a5540435ab6ab19a441e761cc5e7daea12c4
                                                                                                                                                                                            • Instruction Fuzzy Hash: 9A21867262868581EF20DF10F8516EA6354FF94784F80513AF68D87AA5DF3CD305C741
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Message$ByteCharMultiWide
                                                                                                                                                                                            • String ID: Fatal error detected
                                                                                                                                                                                            • API String ID: 1878133881-4025702859
                                                                                                                                                                                            • Opcode ID: 851903317bfc7efaf1ad6cdea84b2df33a0253a3527f03e892242bbcad957f63
                                                                                                                                                                                            • Instruction ID: 13e9ac634d8b56b9770162bdff40ef89c2d27ffcbba694e26a1b8c6d21a49290
                                                                                                                                                                                            • Opcode Fuzzy Hash: 851903317bfc7efaf1ad6cdea84b2df33a0253a3527f03e892242bbcad957f63
                                                                                                                                                                                            • Instruction Fuzzy Hash: 8321867262868181EF20DF10F8516EA6354FF94784F805139F68D87A65DF3CD305CB41
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: ExceptionFileHeaderRaise
                                                                                                                                                                                            • String ID: csm
                                                                                                                                                                                            • API String ID: 2573137834-1018135373
                                                                                                                                                                                            • Opcode ID: 5da07f41cc1f2f0249302dc9aa2704e59a17d1d76e31cb25285a30e0af08f503
                                                                                                                                                                                            • Instruction ID: b107d36bbb245c3c41493f9261b658fdf8a02c404c76a2f19fe702bc5bb8ff28
                                                                                                                                                                                            • Opcode Fuzzy Hash: 5da07f41cc1f2f0249302dc9aa2704e59a17d1d76e31cb25285a30e0af08f503
                                                                                                                                                                                            • Instruction Fuzzy Hash: C5112E32618B4182EB618F15E85026AB7E5FB98B98F598238EECD47758DF3CD6518700
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000000.00000002.2923507705.00007FF62EF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62EF90000, based on PE: true
                                                                                                                                                                                            • Associated: 00000000.00000002.2923464686.00007FF62EF90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923536168.00007FF62EFBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923571436.00007FF62EFD0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000000.00000002.2923618419.00007FF62EFD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_7ff62ef90000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: DriveType_invalid_parameter_noinfo
                                                                                                                                                                                            • String ID: :
                                                                                                                                                                                            • API String ID: 2595371189-336475711
                                                                                                                                                                                            • Opcode ID: 0484c027a31e3174e61c97ce986110c8cc183ac5b324247cdaa72bb813f071bc
                                                                                                                                                                                            • Instruction ID: c752de24429f3741d2cf04cd38b6ef89b9d5baffc9a164636e7ad27d3ae24de1
                                                                                                                                                                                            • Opcode Fuzzy Hash: 0484c027a31e3174e61c97ce986110c8cc183ac5b324247cdaa72bb813f071bc
                                                                                                                                                                                            • Instruction Fuzzy Hash: 62012165D28642C9FF21AF64986127E6290FF68704F44503DF54DC7A91DE2CE644CA16

                                                                                                                                                                                            Execution Graph

                                                                                                                                                                                            Execution Coverage:8.4%
                                                                                                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                            Signature Coverage:3.3%
                                                                                                                                                                                            Total number of Nodes:1203
                                                                                                                                                                                            Total number of Limit Nodes:70
                                                                                                                                                                                            execution_graph 38693 7ffdfac1602f 38696 7ffdfac153c0 38693->38696 38695 7ffdfac16037 38697 7ffdfac15401 38696->38697 38698 7ffdfac15422 IsWindowVisible 38697->38698 38699 7ffdfac1540a GetWindowLongPtrW 38697->38699 38700 7ffdfac15443 GetWindowPlacement 38698->38700 38701 7ffdfac1543f 38698->38701 38699->38698 38708 7ffdfac1552d 38699->38708 38700->38701 38704 7ffdfac155a4 38701->38704 38705 7ffdfac1549e 38701->38705 38707 7ffdfac154af 38701->38707 38703 7ffdfac154c0 GetClientRect MoveWindow 38703->38708 38711 7ffdfac0d260 ShowWindow 38704->38711 38705->38707 38709 7ffdfac0d430 ShowWindow 38705->38709 38707->38703 38707->38708 38708->38695 38710 7ffdfac0d47e 38709->38710 38710->38707 38712 7ffdfac0d2b1 38711->38712 38712->38707 38713 7ffdfacc6135 38714 7ffdfacc6146 38713->38714 38715 7ffdfacc6189 38714->38715 38717 7ffdfacc617a 38714->38717 38725 7ffdfac0d0c0 38715->38725 38722 7ffdfabf68f0 38717->38722 38723 7ffdfabf695b CreateWindowExW SetWindowPos SetWindowLongPtrW 38722->38723 38724 7ffdfabf694c GetModuleHandleW 38722->38724 38724->38723 38726 7ffdfac0d0de 38725->38726 38727 7ffdfac0d112 CreateWindowExW SetWindowPos 38726->38727 38728 7ffdfac0d103 GetModuleHandleW 38726->38728 38728->38727 38729 7ffdfac14370 38730 7ffdfac143d1 AdjustWindowRectEx 38729->38730 38731 7ffdfac143a1 IsIconic 38729->38731 38735 7ffdfac1444a 38730->38735 38732 7ffdfac143af IsZoomed 38731->38732 38734 7ffdfac14602 38731->38734 38733 7ffdfac143c1 38732->38733 38732->38734 38733->38730 38733->38734 38735->38734 38736 7ffdfac1465e GetSystemMetrics MoveWindow GetWindowRect 38735->38736 38737 7ffdfac1462f SendMessageW SendMessageW 38735->38737 38738 7ffdfac146be 38736->38738 38739 7ffdfac14730 38736->38739 38737->38734 38741 7ffdfac146c0 GetClientRect 38738->38741 38742 7ffdfac14732 MoveWindow 38738->38742 38743 7ffdfac146f4 MoveWindow GetWindowRect 38738->38743 38739->38734 38740 7ffdfac1475d DrawMenuBar 38739->38740 38740->38734 38741->38738 38741->38739 38742->38739 38743->38739 38743->38741 38744 7ffdfaec4b10 GetFileType 38745 7ffdfaec4b47 GetConsoleMode 38744->38745 38746 7ffdfaec4b39 38744->38746 38748 7ffdfaec4b59 38745->38748 38749 7ffdfaec4b60 GetCommState 38745->38749 38747 7ffdfaec4b3d GetLastError 38746->38747 38746->38748 38747->38745 38747->38748 38749->38748 38750 7ffdfacc7e70 GetWindowLongPtrW 38753 7ffdfacc7eb2 38750->38753 38755 7ffdfacc7ef6 38750->38755 38751 7ffdfacc802f DefWindowProcW 38752 7ffdfacc804f 38751->38752 38753->38751 38754 7ffdfacc7f50 GetSysColor 38754->38755 38755->38753 38755->38754 38756 7ffdfaed9e90 38757 7ffdfaed9fe1 38756->38757 38758 7ffdfaed9ea1 38756->38758 38763 7ffdfaeda00b QueryPerformanceCounter EnterCriticalSection LeaveCriticalSection 38757->38763 38766 7ffdfaeda04f 38757->38766 38759 7ffdfaed9eaa InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection 38758->38759 38760 7ffdfaed9edb EnterCriticalSection 38758->38760 38759->38760 38761 7ffdfaed9ef5 QueryPerformanceFrequency 38760->38761 38762 7ffdfaed9fd4 LeaveCriticalSection 38760->38762 38764 7ffdfaed9fca 38761->38764 38765 7ffdfaed9f24 7 API calls 38761->38765 38762->38757 38763->38766 38764->38762 38765->38764 38767 7ffdfac1603c 38768 7ffdfac15ed1 38767->38768 38769 7ffdfac15ef7 GetWindowLongPtrW 38768->38769 38770 7ffdfac15f06 38768->38770 38771 7ffdfac15f1f 38768->38771 38769->38770 38770->38771 38773 7ffdfac16271 SetFocus 38770->38773 38774 7ffdfac162a2 38770->38774 38772 7ffdfac162d1 DefWindowProcW 38772->38771 38773->38771 38774->38771 38774->38772 38775 7ffdfae42380 38776 7ffdfae423bb 38775->38776 38777 7ffdfae4240c memmove 38776->38777 38778 7ffdfae423d9 38776->38778 38777->38778 38779 7ffdfae2b2c0 38780 7ffdfae2b315 38779->38780 38782 7ffdfae2b307 38779->38782 38780->38782 38783 7ffdfae2bb30 38780->38783 38798 7ffdfae2bba0 38783->38798 38784 7ffdfae2c008 _errno 38789 7ffdfae2bf76 38784->38789 38785 7ffdfae2bf62 _errno 38785->38789 38787 7ffdfae2c086 _errno 38790 7ffdfae2bfd3 38787->38790 38789->38787 38789->38790 38792 7ffdfae2c10a 38790->38792 38872 7ffdfae90c00 24 API calls 38790->38872 38801 7ffdfae2bf26 38792->38801 38832 7ffdfad8d810 38792->38832 38793 7ffdfae2c296 38796 7ffdfae2c1bc 38848 7ffdfad8b470 38796->38848 38797 7ffdfae2bebf 38797->38801 38871 7ffdfae90c00 24 API calls 38797->38871 38798->38784 38798->38785 38798->38789 38798->38790 38798->38793 38798->38797 38802 7ffdfae2bedf 38798->38802 38805 7ffdfae27e80 38798->38805 38814 7ffdfae26270 38798->38814 38861 7ffdfae2c2c0 38798->38861 38801->38782 38802->38790 38802->38797 38803 7ffdfae2c1c9 38803->38801 38873 7ffdfae90c00 24 API calls 38803->38873 38806 7ffdfae27ea9 38805->38806 38807 7ffdfae27ef9 38806->38807 38809 7ffdfae2808a 38806->38809 38874 7ffdfae28130 38806->38874 38882 7ffdfae90c00 24 API calls 38806->38882 38807->38798 38809->38807 38810 7ffdfae280cf 38809->38810 38883 7ffdfae90c00 24 API calls 38809->38883 38810->38807 38884 7ffdfae90c00 24 API calls 38810->38884 38815 7ffdfae262d7 38814->38815 38816 7ffdfae262fb memchr 38815->38816 38825 7ffdfae26310 38815->38825 38816->38825 38817 7ffdfae2638d memmove 38817->38825 38818 7ffdfae266f0 38818->38798 38819 7ffdfae266bd 38821 7ffdfae266ca 38819->38821 38980 7ffdfae90c00 24 API calls 38819->38980 38820 7ffdfae26608 memmove 38820->38825 38821->38818 38823 7ffdfae266d2 _errno 38821->38823 38823->38818 38824 7ffdfae2675d 38831 7ffdfae2683f 38824->38831 38982 7ffdfae90c00 24 API calls 38824->38982 38825->38817 38825->38818 38825->38819 38825->38820 38825->38824 38827 7ffdfae266e3 38825->38827 38829 7ffdfae265b0 memchr 38825->38829 38979 7ffdfae90c00 24 API calls 38825->38979 38827->38818 38981 7ffdfae90c00 24 API calls 38827->38981 38829->38825 38831->38798 38833 7ffdfad8d9ba 38832->38833 38834 7ffdfad8d843 38832->38834 38835 7ffdfad8d9c5 38833->38835 38844 7ffdfad8da88 38833->38844 38834->38833 38839 7ffdfad8d858 38834->38839 38842 7ffdfad8d9a0 38835->38842 38983 7ffdfae02580 38835->38983 38836 7ffdfad8d8bd 38987 7ffdfad90280 25 API calls 38836->38987 38839->38836 38840 7ffdfad8d88f 38839->38840 38846 7ffdfad8db3a 38839->38846 38840->38836 38841 7ffdfad8d91c 38841->38842 38842->38796 38843 7ffdfad8dc3e 38843->38796 38844->38846 38988 7ffdfae90c00 24 API calls 38844->38988 38846->38843 38989 7ffdfae90c00 24 API calls 38846->38989 38850 7ffdfad8b48f 38848->38850 38849 7ffdfad8b50a 38849->38803 38850->38849 39019 7ffdfac44490 38850->39019 39023 7ffdfac10339 38850->39023 39026 7ffdfad9bd40 38850->39026 39033 7ffdfad9c470 38850->39033 39039 7ffdfad9a8f0 38850->39039 39045 7ffdfac10d46 38850->39045 39051 7ffdfac23576 38850->39051 39054 7ffdfac0fe13 38850->39054 39064 7ffdfac235d0 38850->39064 39067 7ffdfac62d51 38850->39067 38862 7ffdfae2c2eb 38861->38862 38867 7ffdfae2c309 38861->38867 38862->38798 38863 7ffdfae2c30d 38863->38798 38864 7ffdfae2c41d 38865 7ffdfae2c45c 38864->38865 39605 7ffdfae90c00 24 API calls 38864->39605 38865->38798 38867->38863 38867->38864 38868 7ffdfae2c431 38867->38868 39604 7ffdfae90c00 24 API calls 38867->39604 38868->38865 39603 7ffdfae90c00 24 API calls 38868->39603 38871->38801 38872->38792 38873->38801 38875 7ffdfae2817f 38874->38875 38885 7ffdfae80450 38875->38885 38877 7ffdfae28216 38878 7ffdfae2868e memmove 38877->38878 38879 7ffdfae286dc 38877->38879 38880 7ffdfae286b4 38878->38880 38879->38806 38881 7ffdfae28130 53 API calls 38880->38881 38881->38879 38882->38806 38883->38810 38884->38807 38889 7ffdfae8047a 38885->38889 38886 7ffdfae805d5 38888 7ffdfae80450 53 API calls 38886->38888 38887 7ffdfae8054d 38892 7ffdfae80566 38887->38892 38895 7ffdfae80a10 38887->38895 38890 7ffdfae80608 38888->38890 38889->38886 38889->38887 38894 7ffdfae80598 38889->38894 38890->38877 38893 7ffdfae80a10 53 API calls 38892->38893 38892->38894 38893->38894 38894->38877 38896 7ffdfae80ad2 38895->38896 38899 7ffdfae80a19 38895->38899 38896->38892 38897 7ffdfae80af3 38898 7ffdfae80ac0 memmove 38898->38896 38899->38897 38901 7ffdfae80a95 38899->38901 38902 7ffdfae7f070 38899->38902 38901->38896 38901->38898 38903 7ffdfae7f09e 38902->38903 38904 7ffdfae7f0e2 38903->38904 38905 7ffdfae7f2ea 38903->38905 38906 7ffdfae7f119 TlsGetValue 38903->38906 38907 7ffdfae7f0fa TlsAlloc 38903->38907 38904->38905 38908 7ffdfae7f386 TlsGetValue 38904->38908 38909 7ffdfae7f367 TlsAlloc 38904->38909 38932 7ffdfae7f412 38904->38932 38910 7ffdfae7f61b TlsGetValue 38905->38910 38911 7ffdfae7f5fc TlsAlloc 38905->38911 38905->38932 38915 7ffdfae7f131 GetLastError 38906->38915 38916 7ffdfae7f13f 38906->38916 38907->38906 38907->38932 38917 7ffdfae7f39e GetLastError 38908->38917 38918 7ffdfae7f3ac 38908->38918 38909->38908 38909->38932 38919 7ffdfae7f633 GetLastError 38910->38919 38920 7ffdfae7f641 38910->38920 38911->38910 38911->38932 38915->38916 38915->38932 38922 7ffdfae7f144 38916->38922 38931 7ffdfae7f14c 38916->38931 38917->38918 38917->38932 38923 7ffdfae7f3b1 38918->38923 38930 7ffdfae7f3b9 38918->38930 38919->38920 38919->38932 38921 7ffdfae7f646 38920->38921 38933 7ffdfae7f64e 38920->38933 38977 7ffdfae908b0 19 API calls 38921->38977 38973 7ffdfae908b0 19 API calls 38922->38973 38975 7ffdfae908b0 19 API calls 38923->38975 38927 7ffdfae7f64b 38927->38933 38928 7ffdfae7f149 38928->38931 38929 7ffdfae7f3b6 38929->38930 38930->38932 38934 7ffdfae7f3e2 38930->38934 38935 7ffdfae7f465 GetProcessHeap HeapReAlloc 38930->38935 38931->38932 38936 7ffdfae7f203 GetProcessHeap HeapReAlloc 38931->38936 38938 7ffdfae7f179 38931->38938 38932->38901 38933->38932 38937 7ffdfae7f6c8 GetProcessHeap HeapReAlloc 38933->38937 38940 7ffdfae7f70c 38933->38940 38934->38905 38934->38932 38941 7ffdfae7f4bc memmove 38934->38941 38935->38905 38936->38904 38937->38932 38938->38904 38938->38932 38939 7ffdfae7f1b8 memmove 38938->38939 38942 7ffdfae7f1f8 TlsGetValue 38939->38942 38943 7ffdfae7f1d9 TlsAlloc 38939->38943 38940->38932 38944 7ffdfae7f726 memmove 38940->38944 38945 7ffdfae7f4fc TlsGetValue 38941->38945 38946 7ffdfae7f4dd TlsAlloc 38941->38946 38953 7ffdfae7f25a GetLastError 38942->38953 38954 7ffdfae7f268 38942->38954 38943->38932 38943->38942 38949 7ffdfae7f766 TlsGetValue 38944->38949 38950 7ffdfae7f747 TlsAlloc 38944->38950 38951 7ffdfae7f514 GetLastError 38945->38951 38952 7ffdfae7f522 38945->38952 38946->38932 38946->38945 38960 7ffdfae7f77e GetLastError 38949->38960 38961 7ffdfae7f78c 38949->38961 38950->38932 38950->38949 38951->38932 38951->38952 38956 7ffdfae7f52f 38952->38956 38957 7ffdfae7f527 38952->38957 38953->38932 38953->38954 38958 7ffdfae7f26d 38954->38958 38959 7ffdfae7f275 38954->38959 38956->38905 38956->38932 38969 7ffdfae7f54c GetProcessHeap HeapFree 38956->38969 38976 7ffdfae908b0 19 API calls 38957->38976 38974 7ffdfae908b0 19 API calls 38958->38974 38959->38904 38959->38932 38970 7ffdfae7f292 GetProcessHeap HeapFree 38959->38970 38960->38932 38960->38961 38964 7ffdfae7f791 38961->38964 38965 7ffdfae7f799 38961->38965 38978 7ffdfae908b0 19 API calls 38964->38978 38965->38932 38972 7ffdfae7f7b6 GetProcessHeap HeapFree 38965->38972 38966 7ffdfae7f52c 38966->38956 38967 7ffdfae7f272 38967->38959 38969->38905 38970->38904 38971 7ffdfae7f796 38971->38965 38972->38932 38973->38928 38974->38967 38975->38929 38976->38966 38977->38927 38978->38971 38979->38825 38980->38821 38981->38818 38982->38831 38986 7ffdfae025b9 38983->38986 38985 7ffdfae026fe 38985->38842 38986->38985 38990 7ffdfade0040 38986->38990 38987->38841 38988->38846 38989->38843 38991 7ffdfade0096 38990->38991 39000 7ffdfade1df0 38991->39000 38993 7ffdfade011a 38994 7ffdfade02aa 38993->38994 38996 7ffdfade01c6 strncmp 38993->38996 38998 7ffdfade01c4 38993->38998 38997 7ffdfade0342 38994->38997 39013 7ffdfade3310 memmove memmove memmove 38994->39013 38996->38998 38997->38985 38999 7ffdfade1df0 25 API calls 38998->38999 38999->38994 39001 7ffdfade1e2e 39000->39001 39002 7ffdfade1f04 39000->39002 39004 7ffdfade1e60 39001->39004 39011 7ffdfade1f21 39001->39011 39002->38993 39003 7ffdfade20e7 39017 7ffdfadc6300 25 API calls 39003->39017 39004->39002 39014 7ffdfadc6300 25 API calls 39004->39014 39007 7ffdfade2067 39016 7ffdfae90c00 24 API calls 39007->39016 39008 7ffdfade2118 39018 7ffdfae90c00 24 API calls 39008->39018 39011->39002 39011->39003 39011->39007 39015 7ffdfae90c00 24 API calls 39011->39015 39013->38997 39014->39002 39015->39011 39016->39002 39017->39008 39018->39002 39020 7ffdfac444e1 39019->39020 39022 7ffdfac444ba 39019->39022 39020->39022 39071 7ffdfac14f50 39020->39071 39022->38850 39092 7ffdfac12140 39023->39092 39025 7ffdfac1034c 39025->38850 39027 7ffdfad9bd53 39026->39027 39028 7ffdfad9bd71 39026->39028 39027->38850 39032 7ffdfad9cb11 39028->39032 39386 7ffdfae37420 39028->39386 39030 7ffdfad9cb1d 39031 7ffdfad9cb35 _errno 39030->39031 39030->39032 39031->39032 39032->38850 39034 7ffdfad9c486 39033->39034 39035 7ffdfad9c4ad 39033->39035 39034->38850 39038 7ffdfad9c4e8 39035->39038 39397 7ffdfae6cdf0 39035->39397 39037 7ffdfad9c5e4 39037->38850 39038->38850 39040 7ffdfad9a93a 39039->39040 39042 7ffdfad9a91a 39039->39042 39043 7ffdfad9a949 39040->39043 39419 7ffdfae9bb50 59 API calls 39040->39419 39042->38850 39044 7ffdfad8d810 35 API calls 39043->39044 39044->39042 39049 7ffdfac0fe1f 39045->39049 39046 7ffdfac10da3 SendMessageW 39048 7ffdfac10dc1 39046->39048 39050 7ffdfac10e02 39046->39050 39047 7ffdfac10e07 ShowWindow 39047->39050 39048->39047 39048->39050 39049->39045 39049->39046 39049->39048 39050->38850 39420 7ffdfac23610 39051->39420 39053 7ffdfac235a1 39053->38850 39055 7ffdfac0fe2b 39054->39055 39062 7ffdfac0fe1f 39054->39062 39056 7ffdfac0feac SendMessageW 39055->39056 39057 7ffdfac0fe34 39055->39057 39056->39057 39063 7ffdfac0feca 39056->39063 39057->38850 39058 7ffdfac10da3 SendMessageW 39058->39057 39061 7ffdfac10dc1 39058->39061 39059 7ffdfac10de7 39059->39057 39060 7ffdfac10e07 ShowWindow 39059->39060 39060->39057 39061->39059 39062->39058 39062->39059 39063->39057 39065 7ffdfac23610 111 API calls 39064->39065 39066 7ffdfac235e1 39065->39066 39066->38850 39068 7ffdfac62da7 39067->39068 39069 7ffdfac62d61 39067->39069 39068->39069 39520 7ffdfac6dce0 39068->39520 39069->38850 39073 7ffdfac14f73 39071->39073 39072 7ffdfac14f90 39075 7ffdfac14fdb 39072->39075 39078 7ffdfac0f4d0 6 API calls 39072->39078 39073->39072 39083 7ffdfac0f4d0 39073->39083 39076 7ffdfac15027 39075->39076 39077 7ffdfac15009 SendMessageW 39075->39077 39080 7ffdfac1505d 39076->39080 39081 7ffdfac15066 SetWindowPos 39076->39081 39082 7ffdfac15034 SetWindowPos 39076->39082 39079 7ffdfac15087 39077->39079 39078->39075 39079->39022 39080->39081 39081->39079 39082->39081 39084 7ffdfac0f4fd 39083->39084 39085 7ffdfac0f503 39084->39085 39090 7ffdfac0f50a 39084->39090 39091 7ffdfac0d9b0 GetModuleHandleW GetModuleHandleW LoadIconW LoadCursorW RegisterClassW 39085->39091 39087 7ffdfac0f513 39087->39072 39088 7ffdfac0f573 ShowWindow 39088->39087 39090->39087 39090->39088 39091->39090 39093 7ffdfac1218e 39092->39093 39094 7ffdfac12687 39092->39094 39095 7ffdfac12228 39093->39095 39096 7ffdfac121b3 strcmp 39093->39096 39097 7ffdfac121c9 39095->39097 39098 7ffdfac12259 39095->39098 39099 7ffdfac122fc 39095->39099 39096->39095 39096->39097 39097->39025 39101 7ffdfac0db90 11 API calls 39098->39101 39121 7ffdfac0e220 39099->39121 39101->39097 39103 7ffdfac12443 39103->39097 39152 7ffdfac214c0 39103->39152 39104 7ffdfac1230b 39104->39103 39106 7ffdfac12371 SHGetFileInfoW 39104->39106 39117 7ffdfac12488 39104->39117 39107 7ffdfac123aa 39106->39107 39108 7ffdfac123c3 SHGetFileInfoW 39107->39108 39107->39117 39109 7ffdfac12408 39108->39109 39110 7ffdfac12410 39109->39110 39111 7ffdfac12448 memset 39109->39111 39113 7ffdfac12423 DestroyIcon 39110->39113 39114 7ffdfac12415 DestroyIcon 39110->39114 39111->39117 39112 7ffdfac12535 39112->39097 39115 7ffdfac125b6 CreateIconIndirect 39112->39115 39113->39103 39114->39113 39115->39097 39116 7ffdfac125f1 39115->39116 39118 7ffdfac12618 39116->39118 39119 7ffdfac12608 DestroyIcon 39116->39119 39117->39103 39130 7ffdfac0db90 39117->39130 39120 7ffdfac0db90 11 API calls 39118->39120 39119->39097 39120->39097 39122 7ffdfac0e24b 39121->39122 39123 7ffdfac0e25d 39122->39123 39129 7ffdfae2c2c0 24 API calls 39122->39129 39123->39104 39124 7ffdfac0e339 39125 7ffdfac0e604 CreateIconFromResourceEx 39124->39125 39126 7ffdfac0e645 CreateIconFromResource 39124->39126 39127 7ffdfac0e414 39124->39127 39128 7ffdfae2c2c0 24 API calls 39124->39128 39125->39124 39126->39124 39127->39104 39128->39124 39129->39124 39131 7ffdfac0dbb6 39130->39131 39132 7ffdfac0ddcd 39131->39132 39133 7ffdfac0dc5a 39131->39133 39146 7ffdfac0dbd0 39131->39146 39134 7ffdfac0ddd5 39132->39134 39135 7ffdfac0dddc 39132->39135 39136 7ffdfac0dc6f 39133->39136 39137 7ffdfac0dcb0 39133->39137 39157 7ffdfac0d9b0 GetModuleHandleW GetModuleHandleW LoadIconW LoadCursorW RegisterClassW 39134->39157 39140 7ffdfac0de65 SendMessageW 39135->39140 39135->39146 39151 7ffdfac0de7e SendMessageW 39135->39151 39156 7ffdfac0d9b0 GetModuleHandleW GetModuleHandleW LoadIconW LoadCursorW RegisterClassW 39136->39156 39141 7ffdfac0dcb5 SetClassLongPtrW 39137->39141 39147 7ffdfac0dcca SetClassLongPtrW 39137->39147 39142 7ffdfac0df2a SendMessageW 39140->39142 39143 7ffdfac0dd79 SetClassLongPtrW 39141->39143 39142->39146 39143->39146 39146->39103 39147->39143 39150 7ffdfac0dd39 39147->39150 39148 7ffdfac0def0 39148->39142 39149 7ffdfac0dc77 39149->39146 39150->39143 39151->39142 39151->39148 39153 7ffdfac21516 39152->39153 39154 7ffdfac2152a 39153->39154 39158 7ffdfac21fa0 39153->39158 39154->39112 39156->39149 39157->39135 39159 7ffdfac21fc7 39158->39159 39180 7ffdfac2216a 39159->39180 39183 7ffdfad85c21 39159->39183 39205 7ffdfad84c27 39159->39205 39160 7ffdfac21feb 39249 7ffdfac218b0 63 API calls 39160->39249 39162 7ffdfac22026 39250 7ffdfac218b0 63 API calls 39162->39250 39164 7ffdfac2204a 39251 7ffdfac218b0 63 API calls 39164->39251 39166 7ffdfac2206e 39252 7ffdfac218b0 63 API calls 39166->39252 39168 7ffdfac22092 39253 7ffdfac218b0 63 API calls 39168->39253 39170 7ffdfac220b6 39254 7ffdfac218b0 63 API calls 39170->39254 39172 7ffdfac220da 39255 7ffdfac218b0 63 API calls 39172->39255 39174 7ffdfac220fe 39256 7ffdfac218b0 63 API calls 39174->39256 39176 7ffdfac22122 39257 7ffdfac218b0 63 API calls 39176->39257 39178 7ffdfac22146 39258 7ffdfac218b0 63 API calls 39178->39258 39180->39154 39184 7ffdfad85c5f 39183->39184 39185 7ffdfad85caa strstr 39184->39185 39189 7ffdfad85d61 39184->39189 39186 7ffdfad85cc6 39185->39186 39187 7ffdfad85d45 strstr 39186->39187 39186->39189 39187->39189 39188 7ffdfad85ec3 strstr 39188->39189 39189->39188 39191 7ffdfad85f7b 39189->39191 39192 7ffdfad86ea6 39189->39192 39190 7ffdfad8605f strstr 39190->39191 39191->39190 39191->39192 39193 7ffdfad86120 39191->39193 39192->39160 39193->39192 39194 7ffdfad86a05 39193->39194 39291 7ffdfae90c00 24 API calls 39193->39291 39259 7ffdfaecbf30 39194->39259 39197 7ffdfad86a0d 39197->39192 39274 7ffdfae188d0 39197->39274 39199 7ffdfad86bf1 39199->39192 39279 7ffdfae70a70 39199->39279 39201 7ffdfad86db3 39201->39192 39202 7ffdfae70a70 25 API calls 39201->39202 39203 7ffdfad86dff 39202->39203 39203->39192 39204 7ffdfae70a70 25 API calls 39203->39204 39204->39192 39206 7ffdfad84c33 39205->39206 39207 7ffdfad84c99 LeaveCriticalSection 39206->39207 39208 7ffdfad84cb0 39207->39208 39209 7ffdfad85164 _wgetenv 39208->39209 39233 7ffdfad86ea6 39208->39233 39210 7ffdfae63a00 39209->39210 39211 7ffdfad85304 GetCurrentThreadId _wgetenv 39210->39211 39212 7ffdfad85331 39211->39212 39213 7ffdfad85558 LeaveCriticalSection 39212->39213 39214 7ffdfaed9a50 39213->39214 39215 7ffdfad8562e TlsGetValue 39214->39215 39216 7ffdfad8565a 39215->39216 39216->39233 39314 7ffdfad96b40 39216->39314 39218 7ffdfad858df 39219 7ffdfad858ec strstr 39218->39219 39234 7ffdfad85b45 39218->39234 39220 7ffdfad85908 39219->39220 39222 7ffdfad85983 strstr 39220->39222 39220->39234 39221 7ffdfad85caa strstr 39223 7ffdfad85cc6 39221->39223 39224 7ffdfad8599f 39222->39224 39225 7ffdfad85d45 strstr 39223->39225 39230 7ffdfad85d61 39223->39230 39226 7ffdfad85a18 strstr 39224->39226 39224->39234 39225->39230 39227 7ffdfad85a34 39226->39227 39229 7ffdfad85ab1 strstr 39227->39229 39227->39234 39228 7ffdfad85ec3 strstr 39228->39230 39231 7ffdfad85acd 39229->39231 39230->39228 39230->39233 39236 7ffdfad85f7b 39230->39236 39232 7ffdfad85b4d strstr 39231->39232 39231->39234 39232->39234 39233->39160 39234->39221 39234->39230 39235 7ffdfad8605f strstr 39235->39236 39236->39233 39236->39235 39237 7ffdfad86120 39236->39237 39237->39233 39238 7ffdfad86a05 39237->39238 39364 7ffdfae90c00 24 API calls 39237->39364 39240 7ffdfaecbf30 34 API calls 39238->39240 39241 7ffdfad86a0d 39240->39241 39241->39233 39242 7ffdfae188d0 29 API calls 39241->39242 39243 7ffdfad86bf1 39242->39243 39243->39233 39244 7ffdfae70a70 25 API calls 39243->39244 39245 7ffdfad86db3 39244->39245 39245->39233 39246 7ffdfae70a70 25 API calls 39245->39246 39247 7ffdfad86dff 39246->39247 39247->39233 39248 7ffdfae70a70 25 API calls 39247->39248 39248->39233 39249->39162 39250->39164 39251->39166 39252->39168 39253->39170 39254->39172 39255->39174 39256->39176 39257->39178 39258->39180 39292 7ffdfae9e7f0 39259->39292 39261 7ffdfaecbf61 39262 7ffdfaecc042 GetSystemInfo 39261->39262 39263 7ffdfaecbff2 GetModuleHandleW GetProcAddress 39261->39263 39273 7ffdfaecc91e 39261->39273 39268 7ffdfaecc052 39262->39268 39264 7ffdfaecc02b GetVersionExW 39263->39264 39265 7ffdfaecc01e 39263->39265 39266 7ffdfaecc038 39264->39266 39265->39264 39265->39266 39266->39262 39267 7ffdfaecc2bc wsprintfA 39269 7ffdfaecc2f0 39267->39269 39268->39267 39268->39273 39270 7ffdfaecc32f memmove 39269->39270 39272 7ffdfaecc308 39269->39272 39269->39273 39270->39272 39272->39273 39306 7ffdfae90c00 24 API calls 39272->39306 39273->39197 39275 7ffdfae188f2 39274->39275 39276 7ffdfae189a6 39275->39276 39277 7ffdfae18a54 39275->39277 39276->39199 39310 7ffdfae192a0 29 API calls 39277->39310 39280 7ffdfae70a9d 39279->39280 39281 7ffdfae70aac 39280->39281 39282 7ffdfae70b4d 39280->39282 39286 7ffdfae70af5 memmove 39281->39286 39290 7ffdfae70b14 39281->39290 39283 7ffdfae70b93 39282->39283 39284 7ffdfae70b89 39282->39284 39282->39290 39312 7ffdfae90c00 24 API calls 39283->39312 39311 7ffdfae90c00 24 API calls 39284->39311 39286->39290 39288 7ffdfae70bac 39313 7ffdfae90c00 24 API calls 39288->39313 39290->39201 39291->39194 39297 7ffdfae9e630 39292->39297 39293 7ffdfae9e9f6 39293->39261 39294 7ffdfae9e9e3 LeaveCriticalSection 39294->39293 39295 7ffdfae9e9b7 39295->39294 39297->39292 39297->39293 39297->39295 39298 7ffdfae9e6f7 memmove 39297->39298 39302 7ffdfae9e72a 39297->39302 39307 7ffdfae90c00 24 API calls 39297->39307 39298->39297 39299 7ffdfae9e774 39298->39299 39301 7ffdfae9e79c LeaveCriticalSection 39299->39301 39300 7ffdfae9e767 LeaveCriticalSection 39300->39299 39301->39261 39302->39300 39303 7ffdfae9e75f 39302->39303 39308 7ffdfae90c00 24 API calls 39302->39308 39309 7ffdfae90c00 24 API calls 39303->39309 39306->39273 39307->39297 39308->39303 39309->39300 39310->39276 39311->39290 39312->39288 39313->39290 39317 7ffdfad96b63 39314->39317 39315 7ffdfad96da3 39315->39218 39316 7ffdfad96e0b 39321 7ffdfad96f7a 39316->39321 39324 7ffdfad96ee5 39316->39324 39363 7ffdfad96e5f 39316->39363 39317->39315 39317->39316 39318 7ffdfad96c26 memmove 39317->39318 39320 7ffdfad96c8e 39317->39320 39318->39317 39319 7ffdfad96d04 strstr 39319->39320 39320->39315 39320->39319 39323 7ffdfad96fc7 39321->39323 39321->39363 39365 7ffdfae65c50 memmove 39321->39365 39323->39363 39366 7ffdfade9270 24 API calls 39323->39366 39328 7ffdfad9713d 39324->39328 39324->39363 39367 7ffdfae65c50 memmove 39324->39367 39327 7ffdfad971d3 39335 7ffdfad97246 39327->39335 39327->39363 39369 7ffdfad982a0 25 API calls 39327->39369 39328->39327 39328->39335 39328->39363 39368 7ffdfae41760 25 API calls 39328->39368 39331 7ffdfad971f7 39333 7ffdfad97205 39331->39333 39331->39335 39370 7ffdfae41760 25 API calls 39331->39370 39333->39335 39371 7ffdfae65c50 memmove 39333->39371 39335->39363 39372 7ffdfade9270 24 API calls 39335->39372 39337 7ffdfad97404 39373 7ffdfade9270 24 API calls 39337->39373 39339 7ffdfad97421 39374 7ffdfade9270 24 API calls 39339->39374 39341 7ffdfad97439 39375 7ffdfade9270 24 API calls 39341->39375 39343 7ffdfad9746b 39376 7ffdfade9270 24 API calls 39343->39376 39345 7ffdfad97484 39377 7ffdfade9270 24 API calls 39345->39377 39347 7ffdfad9749d 39378 7ffdfade9270 24 API calls 39347->39378 39349 7ffdfad974c2 39379 7ffdfade9270 24 API calls 39349->39379 39351 7ffdfad974de 39380 7ffdfade9270 24 API calls 39351->39380 39353 7ffdfad974f7 39381 7ffdfade9270 24 API calls 39353->39381 39355 7ffdfad97513 39382 7ffdfade9270 24 API calls 39355->39382 39357 7ffdfad9752c 39383 7ffdfade9270 24 API calls 39357->39383 39359 7ffdfad97544 39384 7ffdfade9270 24 API calls 39359->39384 39361 7ffdfad9755d 39385 7ffdfade9270 24 API calls 39361->39385 39363->39218 39364->39238 39365->39323 39366->39363 39367->39328 39368->39327 39369->39331 39370->39333 39371->39335 39372->39337 39373->39339 39374->39341 39375->39343 39376->39345 39377->39347 39378->39349 39379->39351 39380->39353 39381->39355 39382->39357 39383->39359 39384->39361 39385->39363 39387 7ffdfae37435 39386->39387 39389 7ffdfae37554 39386->39389 39387->39389 39393 7ffdfae3743d 39387->39393 39388 7ffdfae6e465 39388->39030 39389->39388 39391 7ffdfae37420 24 API calls 39389->39391 39396 7ffdfae6eae0 24 API calls 39389->39396 39390 7ffdfae37492 39390->39030 39391->39389 39393->39390 39395 7ffdfae6eae0 24 API calls 39393->39395 39395->39390 39396->39389 39398 7ffdfae6ce26 39397->39398 39399 7ffdfae6cee7 39398->39399 39403 7ffdfae6cea2 39398->39403 39413 7ffdfae6cf55 39398->39413 39401 7ffdfae6cf1e strchr 39399->39401 39408 7ffdfae6cedf 39399->39408 39399->39413 39400 7ffdfae6d1b7 strchr 39400->39413 39402 7ffdfae6cf31 39401->39402 39401->39413 39406 7ffdfae6cf42 strchr 39402->39406 39402->39413 39404 7ffdfae6cec8 strchr 39403->39404 39403->39408 39403->39413 39404->39408 39404->39413 39406->39413 39407 7ffdfae6d595 39407->39408 39417 7ffdfae90c00 24 API calls 39407->39417 39408->39037 39409 7ffdfae90c00 24 API calls 39409->39413 39410 7ffdfae80450 53 API calls 39410->39413 39412 7ffdfae6d76a 39412->39037 39413->39400 39413->39407 39413->39408 39413->39409 39413->39410 39414 7ffdfae6d609 39413->39414 39416 7ffdfae14ad0 54 API calls 39413->39416 39414->39412 39418 7ffdfae6eae0 24 API calls 39414->39418 39416->39413 39417->39408 39418->39412 39419->39043 39421 7ffdfac2363d 39420->39421 39422 7ffdfac23645 GetSystemMetrics 39421->39422 39423 7ffdfac23654 39421->39423 39422->39423 39427 7ffdfac23676 39423->39427 39428 7ffdfac47a80 39423->39428 39425 7ffdfac2394a 39425->39427 39435 7ffdfac24060 39425->39435 39427->39053 39429 7ffdfac47ac0 39428->39429 39430 7ffdfac47abb 39428->39430 39432 7ffdfac47c0d 39429->39432 39439 7ffdfac8bc70 39429->39439 39446 7ffdfac0b2b0 strcmp 39429->39446 39431 7ffdfac47a80 67 API calls 39430->39431 39431->39429 39432->39425 39437 7ffdfac240b6 39435->39437 39436 7ffdfac2482c 39436->39427 39437->39436 39460 7ffdfac248a0 39437->39460 39440 7ffdfac8bca9 39439->39440 39441 7ffdfac8bcc2 strchr 39440->39441 39447 7ffdfac8cb20 39440->39447 39443 7ffdfac8bce4 39441->39443 39444 7ffdfac8be1a strncpy 39443->39444 39445 7ffdfac8be39 39443->39445 39444->39445 39445->39429 39446->39429 39448 7ffdfac8cb5b 39447->39448 39449 7ffdfac8cb71 39448->39449 39455 7ffdfac8d100 39448->39455 39451 7ffdfac8cb20 63 API calls 39449->39451 39454 7ffdfac8cb95 39449->39454 39451->39454 39452 7ffdfac8ce6e 39452->39441 39453 7ffdfac8ce45 memcpy 39453->39452 39454->39452 39454->39453 39457 7ffdfac8d12c 39455->39457 39456 7ffdfac8d21d 39458 7ffdfad85c21 44 API calls 39457->39458 39459 7ffdfad84c27 59 API calls 39457->39459 39458->39456 39459->39456 39462 7ffdfac2490a 39460->39462 39461 7ffdfac214c0 63 API calls 39466 7ffdfac249b3 39461->39466 39462->39461 39462->39466 39463 7ffdfac24b5a 39468 7ffdfabf7d20 39463->39468 39465 7ffdfac24d12 39465->39436 39466->39463 39467 7ffdfac24cbf DeleteObject 39466->39467 39467->39463 39469 7ffdfabf7d5c 39468->39469 39470 7ffdfabf7dac GetModuleHandleW 39469->39470 39471 7ffdfabf7dbe FindResourceW 39469->39471 39476 7ffdfabf7ebd 39469->39476 39470->39471 39473 7ffdfabf7e08 LoadResource LockResource 39471->39473 39477 7ffdfabf7df5 39471->39477 39473->39477 39475 7ffdfabf7fcd 39489 7ffdfac02710 39475->39489 39481 7ffdfac55020 39476->39481 39477->39476 39479 7ffdfabf7e6e memcpy 39477->39479 39479->39476 39480 7ffdfabf8021 39480->39465 39484 7ffdfac55086 39481->39484 39482 7ffdfac02710 55 API calls 39482->39484 39483 7ffdfac55501 isspace 39485 7ffdfac554fc 39483->39485 39486 7ffdfac55532 39483->39486 39484->39482 39484->39485 39488 7ffdfac553ad 39484->39488 39485->39483 39485->39486 39487 7ffdfac02710 55 API calls 39486->39487 39486->39488 39487->39488 39488->39475 39490 7ffdfac0276f GetDC SelectObject 39489->39490 39497 7ffdfac02765 39489->39497 39491 7ffdfac02899 GetTextExtentPoint32W 39490->39491 39496 7ffdfac027c3 39490->39496 39499 7ffdfac028f3 39491->39499 39494 7ffdfac02911 SelectObject ReleaseDC 39494->39497 39500 7ffdfac02949 39494->39500 39495 7ffdfac0281a GetTextExtentPoint32W 39495->39496 39496->39491 39496->39495 39498 7ffdfac02866 SelectObject 39496->39498 39496->39499 39502 7ffdfac04340 39496->39502 39497->39480 39498->39496 39499->39494 39500->39497 39501 7ffdfac02710 48 API calls 39500->39501 39501->39497 39503 7ffdfac04996 39502->39503 39504 7ffdfac0438e 39502->39504 39505 7ffdfac043f5 GetDC 39504->39505 39506 7ffdfac044b7 39504->39506 39519 7ffdfac04410 39505->39519 39506->39496 39507 7ffdfac048b1 EnumFontFamiliesW 39511 7ffdfac0487a 39507->39511 39508 7ffdfac04450 _stricmp 39508->39519 39509 7ffdfac04710 _stricmp 39516 7ffdfac046e2 39509->39516 39510 7ffdfac0496c ReleaseDC 39510->39503 39511->39510 39512 7ffdfac04524 _stricmp 39512->39519 39513 7ffdfac04480 _stricmp 39513->39519 39514 7ffdfac04eb0 39 API calls 39514->39516 39515 7ffdfac047c0 _stricmp 39515->39516 39516->39507 39516->39509 39516->39511 39516->39514 39516->39515 39517 7ffdfac04eb0 39 API calls 39517->39519 39518 7ffdfac045f0 _stricmp 39518->39519 39519->39508 39519->39511 39519->39512 39519->39513 39519->39516 39519->39517 39519->39518 39519->39519 39521 7ffdfac6dd21 CreateRectRgnIndirect 39520->39521 39529 7ffdfac70740 39521->39529 39524 7ffdfac6de13 39526 7ffdfac6de4c DeleteObject 39524->39526 39528 7ffdfac6de52 39524->39528 39526->39528 39528->39069 39532 7ffdfac70783 39529->39532 39530 7ffdfac707cd strncmp 39530->39532 39531 7ffdfac70804 strncmp 39531->39532 39532->39530 39532->39531 39533 7ffdfac6ddc3 39532->39533 39536 7ffdfac70840 39532->39536 39533->39524 39533->39528 39538 7ffdfac75aa0 DeleteObject 39533->39538 39534 7ffdfac70bfe 39534->39533 39547 7ffdfac73c40 GetRgnBox 39534->39547 39536->39533 39536->39534 39539 7ffdfac71480 39536->39539 39542 7ffdfac714c4 39539->39542 39540 7ffdfac715ba _strnicmp 39543 7ffdfac71588 39540->39543 39541 7ffdfac7151a _strnicmp 39541->39542 39542->39541 39542->39543 39544 7ffdfac71629 39542->39544 39548 7ffdfac6b330 memset memset 39542->39548 39552 7ffdfac6c890 39542->39552 39543->39540 39543->39544 39544->39534 39547->39534 39549 7ffdfac6b3d9 39548->39549 39555 7ffdfac695a0 39549->39555 39551 7ffdfac6b3e6 39551->39542 39588 7ffdfac6d690 39552->39588 39554 7ffdfac6c8a6 39554->39542 39580 7ffdfac68a50 39555->39580 39558 7ffdfac695e7 memcmp 39559 7ffdfac69603 39558->39559 39560 7ffdfac69690 39558->39560 39561 7ffdfac68a50 25 API calls 39559->39561 39579 7ffdfac6965f 39559->39579 39564 7ffdfac68a50 25 API calls 39560->39564 39560->39579 39562 7ffdfac6963e 39561->39562 39563 7ffdfac69647 memcmp 39562->39563 39562->39579 39563->39560 39563->39579 39565 7ffdfac69744 39564->39565 39566 7ffdfac68a50 25 API calls 39565->39566 39565->39579 39567 7ffdfac6978a 39566->39567 39568 7ffdfac68a50 25 API calls 39567->39568 39567->39579 39569 7ffdfac697fe 39568->39569 39570 7ffdfac68a50 25 API calls 39569->39570 39569->39579 39571 7ffdfac69825 39570->39571 39571->39579 39587 7ffdfac692d0 pow 39571->39587 39573 7ffdfac69839 39574 7ffdfac68a50 25 API calls 39573->39574 39573->39579 39575 7ffdfac69860 39574->39575 39576 7ffdfac68a50 25 API calls 39575->39576 39575->39579 39577 7ffdfac698bd 39576->39577 39578 7ffdfac68a50 25 API calls 39577->39578 39577->39579 39578->39579 39579->39551 39581 7ffdfac68a7d 39580->39581 39582 7ffdfac68c07 39580->39582 39581->39558 39581->39579 39583 7ffdfac68c12 39582->39583 39584 7ffdfac68ce5 39582->39584 39583->39581 39585 7ffdfac68c92 memcpy 39583->39585 39584->39581 39586 7ffdfae2c2c0 24 API calls 39584->39586 39585->39583 39586->39584 39587->39573 39601 7ffdfae2c2c0 24 API calls 39588->39601 39589 7ffdfac6d6f0 isspace 39592 7ffdfac6d6dc 39589->39592 39590 7ffdfac6d807 39590->39554 39591 7ffdfac6d769 isspace 39591->39592 39592->39589 39592->39590 39592->39591 39593 7ffdfac6d720 isspace 39592->39593 39594 7ffdfac6d7d7 39592->39594 39599 7ffdfac6d7a8 isspace 39592->39599 39593->39592 39595 7ffdfac6d873 39594->39595 39596 7ffdfac6d7e6 strncmp 39594->39596 39602 7ffdfacef8c8 IsProcessorFeaturePresent __raise_securityfailure RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 39595->39602 39596->39590 39598 7ffdfac6d80c strncmp 39596->39598 39598->39590 39599->39592 39600 7ffdfac6d878 39601->39592 39602->39600 39603->38865 39604->38867 39605->38865 39606 7ffdfac1c91f 39607 7ffdfac1c924 39606->39607 39608 7ffdfac1ccf8 memset 39607->39608 39609 7ffdfac1cd24 39607->39609 39608->39609 39610 7ffdfad7d510 TlsGetValue 39611 7ffdfad7d56a 39610->39611 39612 7ffdfad7d595 memset 39611->39612 39613 7ffdfad7d5d8 39611->39613 39614 7ffdfad7d5b4 39611->39614 39612->39614 39614->39613 39616 7ffdfad7d7cc 39614->39616 39619 7ffdfad7d6d0 39614->39619 39615 7ffdfad7d725 39617 7ffdfad7d75a 39615->39617 39618 7ffdfad7d896 39615->39618 39616->39613 39675 7ffdfae90c00 24 API calls 39616->39675 39653 7ffdfad7f0b0 39617->39653 39641 7ffdfad7d9e0 39618->39641 39619->39615 39623 7ffdfad7d70b memset 39619->39623 39622 7ffdfad7d770 39625 7ffdfad7d8ed 39622->39625 39627 7ffdfad7f0b0 24 API calls 39622->39627 39623->39615 39626 7ffdfad7d905 39625->39626 39676 7ffdfae90c00 24 API calls 39625->39676 39628 7ffdfad7d92b 39626->39628 39632 7ffdfad7f2b0 24 API calls 39626->39632 39629 7ffdfad7d793 39627->39629 39628->39613 39677 7ffdfae90c00 24 API calls 39628->39677 39631 7ffdfad7d79f 39629->39631 39636 7ffdfad7d820 39629->39636 39665 7ffdfad7f2b0 39631->39665 39632->39626 39635 7ffdfad7d8d2 memmove 39635->39625 39637 7ffdfad7f2b0 24 API calls 39636->39637 39638 7ffdfad7d83d 39637->39638 39639 7ffdfad7f2b0 24 API calls 39638->39639 39640 7ffdfad7d7a7 39639->39640 39640->39625 39640->39635 39642 7ffdfad7f0b0 24 API calls 39641->39642 39643 7ffdfad7da1c 39642->39643 39644 7ffdfad7f2b0 24 API calls 39643->39644 39652 7ffdfad7dac2 39643->39652 39645 7ffdfad7da72 39644->39645 39646 7ffdfad7f0b0 24 API calls 39645->39646 39645->39652 39647 7ffdfad7dae7 39646->39647 39648 7ffdfad7db76 39647->39648 39650 7ffdfad7dbc0 39647->39650 39647->39652 39649 7ffdfad7f2b0 24 API calls 39648->39649 39649->39652 39651 7ffdfad7f2b0 24 API calls 39650->39651 39651->39652 39652->39640 39656 7ffdfad7f0fb 39653->39656 39654 7ffdfad7f23e 39655 7ffdfad7f24c 39654->39655 39679 7ffdfae90c00 24 API calls 39654->39679 39659 7ffdfad7f25a 39655->39659 39680 7ffdfae90c00 24 API calls 39655->39680 39656->39654 39661 7ffdfad7f100 39656->39661 39678 7ffdfae90c00 24 API calls 39656->39678 39660 7ffdfad7f268 39659->39660 39681 7ffdfae90c00 24 API calls 39659->39681 39660->39661 39682 7ffdfae90c00 24 API calls 39660->39682 39661->39622 39666 7ffdfad7f2bf 39665->39666 39667 7ffdfad7f2f7 39665->39667 39669 7ffdfad7f2cd 39666->39669 39683 7ffdfae90c00 24 API calls 39666->39683 39667->39640 39671 7ffdfad7f2db 39669->39671 39684 7ffdfae90c00 24 API calls 39669->39684 39672 7ffdfad7f2e9 39671->39672 39685 7ffdfae90c00 24 API calls 39671->39685 39672->39667 39686 7ffdfae90c00 24 API calls 39672->39686 39675->39613 39676->39626 39677->39613 39678->39654 39679->39655 39680->39659 39681->39660 39682->39661 39683->39669 39684->39671 39685->39672 39686->39667 39687 7ffdfae50d00 39688 7ffdfae50d3f 39687->39688 39690 7ffdfae50d9c 39688->39690 39691 7ffdfae4f1a0 39688->39691 39693 7ffdfae4f1d9 39691->39693 39692 7ffdfae4f4eb 39695 7ffdfae4f512 TlsGetValue 39692->39695 39700 7ffdfae4f52f 39692->39700 39693->39692 39698 7ffdfae4f3fc 39693->39698 39701 7ffdfae90c00 24 API calls 39693->39701 39695->39700 39696 7ffdfae4f5f0 TlsGetValue 39697 7ffdfae4f60d 39696->39697 39697->39698 39702 7ffdfae90c00 24 API calls 39697->39702 39698->39690 39700->39696 39700->39698 39701->39692 39702->39698 39703 7ffdfacc7b20 39705 7ffdfacc7b30 39703->39705 39704 7ffdfacc7c8f 39705->39704 39707 7ffdfacd8570 39705->39707 39708 7ffdfacd85aa 39707->39708 39709 7ffdfacd8a75 GetModuleHandleW 39708->39709 39710 7ffdfacd8a87 LoadIconW LoadIconW LoadCursorW RegisterClassExW 39708->39710 39709->39710 39711 7ffdfacd8b5c CreateWindowExW SetWindowLongPtrW ShowWindow UpdateWindow 39710->39711 39712 7ffdfacd8bce 39710->39712 39711->39712 39715 7ffdfacc91f0 39712->39715 39714 7ffdfacd8c22 39714->39704 39717 7ffdfacc9214 39715->39717 39716 7ffdfacc9240 39716->39714 39717->39716 39718 7ffdfacc9339 CreateBitmap CreatePatternBrush 39717->39718 39719 7ffdfacc9388 39718->39719 39719->39714 39720 7ffdfacc5060 39722 7ffdfacc508f 39720->39722 39721 7ffdfacc510d 39728 7ffdfacc50f5 39722->39728 39739 7ffdfac6dbd0 isupper 39722->39739 39724 7ffdfacc50dd 39740 7ffdfac6dbd0 isupper 39724->39740 39726 7ffdfacc50e9 39741 7ffdfac6dbd0 isupper 39726->39741 39728->39721 39731 7ffdfac1b2b0 39728->39731 39730 7ffdfacc51e4 39735 7ffdfac1b2d8 39731->39735 39737 7ffdfac1b38d 39731->39737 39735->39737 39738 7ffdfae188d0 29 API calls 39735->39738 39736 7ffdfac1b755 39742 7ffdfac1b8a0 39737->39742 39738->39735 39739->39724 39740->39726 39741->39728 39743 7ffdfac1b8c1 memset 39742->39743 39744 7ffdfac1ba79 39743->39744 39745 7ffdfac1bac9 memset 39744->39745 39746 7ffdfac1b71c memset 39744->39746 39745->39746 39746->39736 39747 7ffdfac0f6a7 39748 7ffdfac0f6e6 39747->39748 39749 7ffdfac0f8f1 DestroyWindow 39748->39749 39750 7ffdfac0f924 39749->39750 39751 7ffdfad7e018 39752 7ffdfad7e034 39751->39752 39754 7ffdfad7e028 39751->39754 39755 7ffdfad7e1d0 39752->39755 39760 7ffdfad7d970 39755->39760 39758 7ffdfad7d970 24 API calls 39759 7ffdfad7e210 39758->39759 39759->39754 39761 7ffdfad7d990 39760->39761 39763 7ffdfad7d9a4 39760->39763 39762 7ffdfad7f0b0 24 API calls 39761->39762 39762->39763 39763->39758 39763->39759 39764 7ffdfac049b0 39765 7ffdfac049fd 39764->39765 39767 7ffdfac04a51 39765->39767 39768 7ffdfac04eb0 39765->39768 39769 7ffdfac04ed8 39768->39769 39773 7ffdfac05000 39769->39773 39774 7ffdfac03f80 39769->39774 39771 7ffdfac04f3f 39772 7ffdfac04fcf memcpy 39771->39772 39771->39773 39772->39773 39773->39767 39775 7ffdfac03fca SelectObject GetTextFaceW 39774->39775 39776 7ffdfac04004 39775->39776 39777 7ffdfac04056 SelectObject 39776->39777 39778 7ffdfac0406d 39777->39778 39781 7ffdfac040db 39778->39781 39783 7ffdfad969e0 39778->39783 39779 7ffdfac04091 memset 39800 7ffdfac05380 SelectObject 39779->39800 39781->39771 39784 7ffdfad969ed 39783->39784 39785 7ffdfad969f6 39784->39785 39786 7ffdfad96a45 __acrt_iob_func fflush 39784->39786 39785->39779 39787 7ffdfad96a6d 39786->39787 39788 7ffdfae90ac1 TlsAlloc 39787->39788 39789 7ffdfae90ae0 TlsGetValue 39788->39789 39793 7ffdfae90be4 39788->39793 39791 7ffdfae90b0b 39789->39791 39792 7ffdfae90afd GetLastError 39789->39792 39794 7ffdfae90b15 39791->39794 39795 7ffdfae90b1d GetProcessHeap HeapAlloc 39791->39795 39792->39791 39792->39793 39812 7ffdfae908b0 19 API calls 39794->39812 39799 7ffdfae90b57 39795->39799 39798 7ffdfae90b1a 39798->39795 39799->39779 39801 7ffdfac053fa GetFontData 39800->39801 39802 7ffdfac053f2 39800->39802 39803 7ffdfac0570a GetTextCharset 39801->39803 39810 7ffdfac05436 39801->39810 39802->39801 39804 7ffdfac05749 SelectObject 39803->39804 39807 7ffdfac05708 39803->39807 39805 7ffdfac05778 39804->39805 39805->39781 39806 7ffdfac05473 GetFontData 39806->39810 39807->39804 39808 7ffdfac0553d GetFontData 39808->39810 39809 7ffdfac055d9 GetFontData GetFontData 39809->39810 39810->39804 39810->39806 39810->39807 39810->39808 39811 7ffdfad969e0 26 API calls 39810->39811 39811->39809 39812->39798 39813 7ffdfac01470 39814 7ffdfac01490 SendMessageW SendMessageW SendMessageW 39813->39814 39818 7ffdfac01516 39813->39818 39815 7ffdfac01509 39814->39815 39815->39818 39816 7ffdfac015b8 39817 7ffdfac0ed74 GetFocus 39819 7ffdfac0ed99 GetForegroundWindow 39817->39819 39821 7ffdfac0eda4 IsWindow 39817->39821 39818->39816 39818->39817 39819->39821 39822 7ffdfac0f13f SetWindowLongPtrW 39821->39822 39823 7ffdfac0edeb 39821->39823 39824 7ffdfac0f167 SetWindowLongPtrW 39822->39824 39825 7ffdfac0f17c SetParent 39822->39825 39823->39822 39824->39825 39826 7ffdfac0f192 SendMessageW SendMessageW 39825->39826 39827 7ffdfac0f26c 39825->39827 39826->39827 39830 7ffdfac0f1d0 GetDesktopWindow 39826->39830 39828 7ffdfac0f27f SendMessageW 39827->39828 39829 7ffdfac0f2f1 39827->39829 39828->39829 39831 7ffdfac0f299 SendMessageW 39828->39831 39833 7ffdfac0f2ff SetWindowPos 39829->39833 39834 7ffdfac0f322 39829->39834 39830->39827 39832 7ffdfac0f1df SetWindowLongPtrW 39830->39832 39837 7ffdfac0f2cf 39831->39837 39835 7ffdfac0f258 SetMenu DestroyWindow 39832->39835 39846 7ffdfac0f1f9 39832->39846 39833->39834 39856 7ffdfac0f600 39834->39856 39835->39827 39843 7ffdfac0f2d7 SendMessageW 39837->39843 39838 7ffdfac0f32c 39839 7ffdfac0f34e 39838->39839 39840 7ffdfac0f339 SendMessageW 39838->39840 39841 7ffdfac0f371 39839->39841 39842 7ffdfac0f35b SendMessageW 39839->39842 39840->39839 39844 7ffdfac0f37d SendMessageW 39841->39844 39845 7ffdfac0f3e9 39841->39845 39842->39841 39843->39829 39847 7ffdfac0f39d 39844->39847 39848 7ffdfac0f3f5 SetMenu 39845->39848 39854 7ffdfac0f40d 39845->39854 39846->39835 39849 7ffdfac0f22f SetParent 39846->39849 39850 7ffdfac0d260 ShowWindow 39847->39850 39848->39854 39849->39846 39850->39845 39851 7ffdfac0f462 SetActiveWindow 39853 7ffdfac0f49e 39851->39853 39854->39851 39855 7ffdfac0f600 ShowWindow 39854->39855 39855->39854 39857 7ffdfac0f617 39856->39857 39860 7ffdfac0f625 39856->39860 39857->39838 39858 7ffdfac0f654 ShowWindow 39859 7ffdfac0f665 39858->39859 39859->39838 39860->39858 39860->39859 39861 7ffdfae33d30 39862 7ffdfae33d63 39861->39862 39863 7ffdfae33d68 39862->39863 39864 7ffdfae33dfa 39862->39864 39865 7ffdfae37420 24 API calls 39862->39865 39878 7ffdfae35b20 28 API calls 39864->39878 39871 7ffdfae33d88 39865->39871 39867 7ffdfae33e01 39869 7ffdfae37420 24 API calls 39867->39869 39873 7ffdfae33e0d 39867->39873 39868 7ffdfae33d8d 39870 7ffdfae33d96 _errno 39868->39870 39874 7ffdfae33da7 39868->39874 39872 7ffdfae33eaa 39869->39872 39870->39874 39871->39864 39871->39868 39871->39870 39872->39874 39877 7ffdfae33f3b 39872->39877 39879 7ffdfae41760 25 API calls 39872->39879 39877->39874 39880 7ffdfae90c00 24 API calls 39877->39880 39878->39867 39879->39877 39880->39874 39881 7ffdfae27630 TlsGetValue 39882 7ffdfae27653 39881->39882 39883 7ffdfae27ab4 memmove 39882->39883 39884 7ffdfae276d1 39882->39884 39883->39884 39885 7ffdfac1600f 39886 7ffdfac15ed5 39885->39886 39887 7ffdfac16019 39885->39887 39888 7ffdfac15ef7 GetWindowLongPtrW 39886->39888 39891 7ffdfac15f06 39886->39891 39895 7ffdfac02020 39887->39895 39888->39891 39890 7ffdfac15f1f 39891->39890 39893 7ffdfac16271 SetFocus 39891->39893 39894 7ffdfac162a2 39891->39894 39892 7ffdfac162d1 DefWindowProcW 39892->39890 39893->39890 39894->39890 39894->39892 39896 7ffdfac02061 memset SystemParametersInfoW 39895->39896 39897 7ffdfac0205d 39895->39897 39898 7ffdfac02097 CreateFontIndirectW 39896->39898 39899 7ffdfac021d3 SystemParametersInfoW 39896->39899 39897->39896 39924 7ffdfac01f50 39898->39924 39900 7ffdfac021f2 CreateFontIndirectW 39899->39900 39901 7ffdfac02220 6 API calls 39899->39901 39903 7ffdfac01f50 51 API calls 39900->39903 39905 7ffdfac01f50 51 API calls 39901->39905 39906 7ffdfac02214 DeleteObject 39903->39906 39904 7ffdfac020bc DeleteObject CreateFontIndirectW 39907 7ffdfac01f50 51 API calls 39904->39907 39908 7ffdfac022d0 DeleteObject 39905->39908 39906->39901 39909 7ffdfac020ea DeleteObject CreateFontIndirectW 39907->39909 39910 7ffdfac022e3 39908->39910 39913 7ffdfac02315 39908->39913 39911 7ffdfac01f50 51 API calls 39909->39911 39912 7ffdfac022f0 GetStockObject 39910->39912 39910->39913 39914 7ffdfac02118 DeleteObject CreateFontIndirectW 39911->39914 39915 7ffdfac01f50 51 API calls 39912->39915 39913->39890 39916 7ffdfac01f50 51 API calls 39914->39916 39915->39910 39917 7ffdfac02146 DeleteObject CreateFontIndirectW 39916->39917 39918 7ffdfac01f50 51 API calls 39917->39918 39919 7ffdfac02174 DeleteObject CreateFontIndirectW 39918->39919 39920 7ffdfac01f50 51 API calls 39919->39920 39921 7ffdfac0219f DeleteObject CreateFontIndirectW 39920->39921 39922 7ffdfac01f50 51 API calls 39921->39922 39923 7ffdfac021ca DeleteObject 39922->39923 39923->39899 39925 7ffdfac01f95 39924->39925 39932 7ffdfac03ae0 39925->39932 39927 7ffdfac01fdc 39943 7ffdfac53f60 39927->39943 39931 7ffdfac01ffb 39931->39904 39933 7ffdfac03b20 GetDC SelectObject GetTextMetricsW GetTextFaceW 39932->39933 39935 7ffdfac03b7c 39933->39935 39936 7ffdfac03f80 38 API calls 39935->39936 39940 7ffdfac03cc6 39936->39940 39937 7ffdfac03d35 GetCharWidthW 39939 7ffdfac03d43 SelectObject ReleaseDC 39937->39939 39938 7ffdfac03d3d GetCharWidthA 39938->39939 39942 7ffdfac03d7d 39939->39942 39940->39937 39940->39938 39942->39927 39944 7ffdfac53fa1 39943->39944 39945 7ffdfac01fef 39944->39945 39952 7ffdfac53ad0 51 API calls 39944->39952 39947 7ffdfac03da0 39945->39947 39948 7ffdfac03f35 39947->39948 39951 7ffdfac03dc0 39947->39951 39948->39931 39949 7ffdfac03de0 DeleteObject 39950 7ffdfac03dfc DeleteObject 39949->39950 39949->39951 39950->39951 39951->39948 39951->39949 39952->39945 39953 7ffdfac15d50 39954 7ffdfac15d61 39953->39954 39955 7ffdfac15d6b 39953->39955 39957 7ffdfac17461 39954->39957 39958 7ffdfac173e7 39954->39958 39959 7ffdfac173fd 39954->39959 39964 7ffdfac17606 39954->39964 39956 7ffdfac15de2 39955->39956 39960 7ffdfac15d9a SendMessageW 39955->39960 39957->39959 39962 7ffdfac1747c 39957->39962 39957->39964 39958->39959 39963 7ffdfac1743b 39958->39963 39958->39964 39961 7ffdfac17422 DefWindowProcW 39959->39961 39959->39964 39960->39956 39961->39964 39966 7ffdfac175ed DefWindowProcW 39962->39966 39967 7ffdfac17489 ImmGetContext 39962->39967 39977 7ffdfac179c0 39963->39977 39966->39964 39967->39966 39969 7ffdfac1749b ImmGetCompositionStringW 39967->39969 39968 7ffdfac17445 DefWindowProcW 39968->39964 39970 7ffdfac174b9 ImmGetCompositionStringW 39969->39970 39971 7ffdfac175dc ImmReleaseContext 39969->39971 39973 7ffdfac174ed 39970->39973 39971->39964 40005 7ffdfac0bb70 11 API calls 39973->40005 39975 7ffdfac17566 GetTickCount 39976 7ffdfac17580 39975->39976 39976->39971 39978 7ffdfac17a0f 39977->39978 39979 7ffdfac17a25 WindowFromPoint 39978->39979 39980 7ffdfac17a4b 39978->39980 39979->39980 39981 7ffdfac17a6a memset 39980->39981 39983 7ffdfac18113 39980->39983 39984 7ffdfac17abf 39981->39984 39982 7ffdfac17ca4 39982->39983 39987 7ffdfac17cbb 39982->39987 39983->39968 39984->39982 39984->39983 39986 7ffdfac17d63 GetTickCount GetMessagePos ScreenToClient 39984->39986 39988 7ffdfac17d47 39984->39988 40006 7ffdfac0bb70 11 API calls 39984->40006 39989 7ffdfac17fba 39986->39989 39994 7ffdfac17de5 39986->39994 39990 7ffdfac17cd2 GetTickCount 39987->39990 39988->39986 39997 7ffdfac17d5e 39988->39997 39991 7ffdfac17fd4 39989->39991 39992 7ffdfac1806c GetTickCount 39989->39992 39993 7ffdfac17eed 39989->39993 39990->39983 39991->39983 39996 7ffdfac17fde GetTickCount 39991->39996 39992->39993 39993->39983 39994->39993 39998 7ffdfac17ed0 39994->39998 40002 7ffdfac17e07 39994->40002 39995 7ffdfac17e41 PeekMessageA 39995->39983 39995->40002 39996->39993 39997->39986 39998->39993 40000 7ffdfac17f44 IsDBCSLeadByte 39998->40000 39999 7ffdfac17e69 GetMessageA 39999->40002 40000->39993 40001 7ffdfac17f5e PeekMessageW 40000->40001 40001->39993 40003 7ffdfac17f82 40001->40003 40002->39983 40002->39995 40002->39999 40003->39993 40004 7ffdfac17f8b GetMessageW 40003->40004 40004->39993 40005->39975 40006->39984 40007 7ffdfac5894d 40010 7ffdfac58960 40007->40010 40008 7ffdfac58997 strncmp 40008->40010 40009 7ffdfac589da strncmp 40009->40010 40010->40008 40010->40009 40011 7ffdfac58a1c strncmp 40010->40011 40012 7ffdfac58a94 strncmp 40010->40012 40013 7ffdfac58a5b strncmp 40010->40013 40014 7ffdfac58ace 40010->40014 40011->40010 40012->40010 40013->40010 40015 7ffdfac8bc70 66 API calls 40014->40015 40016 7ffdfac58bca 40014->40016 40028 7ffdfac58e62 40014->40028 40015->40016 40017 7ffdfac58c15 40016->40017 40018 7ffdfac8bc70 66 API calls 40016->40018 40019 7ffdfac58c5a 40017->40019 40020 7ffdfac8bc70 66 API calls 40017->40020 40017->40028 40018->40017 40021 7ffdfac58c78 40019->40021 40022 7ffdfac8bc70 66 API calls 40019->40022 40020->40019 40024 7ffdfac58cbb 40021->40024 40029 7ffdfacc3cf0 10 API calls 40021->40029 40022->40021 40025 7ffdfac58d91 memset 40024->40025 40024->40028 40026 7ffdfac58ddd 40025->40026 40027 7ffdfac47a80 67 API calls 40026->40027 40027->40028 40029->40024 40030 7ffdfadf3a60 40036 7ffdfadf3a80 40030->40036 40031 7ffdfadf3c05 LeaveCriticalSection 40032 7ffdfadf3c17 40031->40032 40033 7ffdfae9e7f0 28 API calls 40032->40033 40035 7ffdfadf3c23 40033->40035 40034 7ffdfadf3ccd 40035->40034 40039 7ffdfadf3d75 40035->40039 40040 7ffdfadf3cab 40035->40040 40036->40031 40037 7ffdfadf3b73 memmove 40036->40037 40038 7ffdfadf3bfd 40036->40038 40036->40039 40037->40036 40038->40031 40042 7ffdfadf3dd2 LeaveCriticalSection 40039->40042 40047 7ffdfadf3db0 40039->40047 40040->40034 40051 7ffdfae90c00 24 API calls 40040->40051 40042->40047 40043 7ffdfadf3e4e LeaveCriticalSection 40044 7ffdfaed95c0 40043->40044 40046 7ffdfadf3e6e LeaveCriticalSection 40044->40046 40045 7ffdfadf3dbd 40047->40043 40047->40045 40048 7ffdfadf3e46 40047->40048 40052 7ffdfae90c00 24 API calls 40047->40052 40053 7ffdfae90c00 24 API calls 40048->40053 40051->40034 40052->40048 40053->40043 40054 7ffdfac5a8c0 40055 7ffdfac5a8d6 40054->40055 40057 7ffdfac5a914 40055->40057 40058 7ffdfacc6050 40055->40058 40059 7ffdfacc6078 40058->40059 40060 7ffdfacc609c 40058->40060 40059->40060 40061 7ffdfacc609e 40059->40061 40062 7ffdfacc6094 40059->40062 40060->40057 40063 7ffdfac0d260 ShowWindow 40061->40063 40064 7ffdfac0f4d0 6 API calls 40062->40064 40063->40060 40064->40060 40065 7ffdfac908c0 40067 7ffdfac908e0 40065->40067 40066 7ffdfac90c4f 40067->40066 40068 7ffdfac90bae MoveWindow 40067->40068 40069 7ffdfacc6050 7 API calls 40067->40069 40068->40067 40069->40067 40070 7ffdfac95980 40071 7ffdfac9598c 40070->40071 40073 7ffdfacc5cce 40071->40073 40074 7ffdfac0d1a0 40071->40074 40075 7ffdfac0d1e1 40074->40075 40080 7ffdfac91890 40075->40080 40078 7ffdfac0d236 40078->40073 40079 7ffdfac0d22d DestroyWindow 40079->40078 40081 7ffdfac918b2 40080->40081 40082 7ffdfac0d1f2 40081->40082 40083 7ffdfac918fa GetCapture 40081->40083 40082->40078 40082->40079 40084 7ffdfac91908 40083->40084 40084->40082 40085 7ffdfac9190d ReleaseCapture 40084->40085 40085->40082 40086 7ffdfabf8390 40087 7ffdfabf83c0 40086->40087 40088 7ffdfabf855a DefWindowProcW 40087->40088 40089 7ffdfabf8553 40087->40089 40088->40089 40090 7ffdfade1130 40092 7ffdfade117d 40090->40092 40091 7ffdfade1313 40092->40091 40094 7ffdfade2510 40092->40094 40104 7ffdfade2593 40094->40104 40095 7ffdfade2dd9 40105 7ffdfade2e02 40095->40105 40109 7ffdfae90c00 24 API calls 40095->40109 40098 7ffdfade2e0f 40098->40092 40099 7ffdfade1df0 25 API calls 40099->40104 40100 7ffdfade29cb memmove 40100->40104 40101 7ffdfade2510 25 API calls 40103 7ffdfade2ecb 40101->40103 40102 7ffdfade2951 memmove 40102->40100 40104->40099 40104->40100 40104->40102 40104->40105 40106 7ffdfade2b05 40104->40106 40107 7ffdfae90c00 24 API calls 40104->40107 40105->40098 40105->40101 40106->40095 40108 7ffdfae90c00 24 API calls 40106->40108 40107->40104 40108->40095 40109->40105 40110 7ffdfade16b0 40111 7ffdfade171f 40110->40111 40112 7ffdfade1907 40111->40112 40114 7ffdfae90c00 24 API calls 40111->40114 40114->40111 40115 7ffdfac48009 40117 7ffdfac4800d 40115->40117 40118 7ffdfac47fcc 40117->40118 40119 7ffdfac54200 40117->40119 40122 7ffdfac5423f 40119->40122 40120 7ffdfac02710 55 API calls 40124 7ffdfac54290 40120->40124 40121 7ffdfac54454 40127 7ffdfac5439b 40121->40127 40128 7ffdfac57b60 strchr isspace 40121->40128 40122->40121 40123 7ffdfac54437 GetStockObject 40122->40123 40122->40124 40122->40127 40125 7ffdfac03ae0 46 API calls 40123->40125 40124->40118 40125->40121 40127->40120 40127->40124 40128->40127
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • LeaveCriticalSection.KERNEL32 ref: 00007FFDFAD84CA0
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE90F20: TlsAlloc.KERNEL32 ref: 00007FFDFAE90F2D
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE90F20: TlsGetValue.KERNEL32 ref: 00007FFDFAE90F5B
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE90F20: GetLastError.KERNEL32 ref: 00007FFDFAE90F69
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE90F20: LeaveCriticalSection.KERNEL32 ref: 00007FFDFAE9100B
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE90F20: GetProcessHeap.KERNEL32 ref: 00007FFDFAE9101F
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE90F20: HeapAlloc.KERNEL32 ref: 00007FFDFAE91030
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90AC1
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90AEF
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90AFD
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90B3B
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90B49
                                                                                                                                                                                            • _wgetenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0 ref: 00007FFDFAD85257
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE63A00: TlsAlloc.KERNEL32(?,?,?,?,00007FFDFAD93181), ref: 00007FFDFAE63A0D
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE63A00: TlsGetValue.KERNEL32(?,?,?,?,00007FFDFAD93181), ref: 00007FFDFAE63A3B
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE63A00: GetLastError.KERNEL32(?,?,?,?,00007FFDFAD93181), ref: 00007FFDFAE63A49
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE63A00: LeaveCriticalSection.KERNEL32(?,?,?,?,00007FFDFAD93181), ref: 00007FFDFAE63AEB
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE63A00: GetProcessHeap.KERNEL32(?,?,?,?,00007FFDFAD93181), ref: 00007FFDFAE63AFF
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE63A00: HeapAlloc.KERNEL32(?,?,?,?,00007FFDFAD93181), ref: 00007FFDFAE63B10
                                                                                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 00007FFDFAD85310
                                                                                                                                                                                            • _wgetenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0 ref: 00007FFDFAD85326
                                                                                                                                                                                            • LeaveCriticalSection.KERNEL32 ref: 00007FFDFAD85563
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: AllocHeap$CriticalLeaveSection$ErrorLastProcessValue$_wgetenv$CurrentThread
                                                                                                                                                                                            • String ID: 1.1.0$1.2.11$2.0.1$8.6.12$::tcl$::tcl::Bgerror$::tcl::mathfunc$::tcl::mathop$::tcl::prefix$::tcl::unsupported$::tcl::unsupported::assemble$::tcl::unsupported::corotype$::tcl::unsupported::disassemble$::tcl::unsupported::getbytecode$::tcl::unsupported::representation$::tcl::unsupported::timerate$Can't create math function namespace$INNER$TCL_INTERP_DEBUG_FRAME$TCL_PKG_PREFER_LATEST$Tcl$TclOO$UpdateStringProc for type '%s' failed to create a valid string rep$UpdateStringProc should not be invoked for type %s$array$athop::$binary$binary decode$binary encode$builtin command with NULL object command proc and a NULL compile proc$can't create math operator namespace$cp1252$dian$dict$encoding$engine$failed to create math operator %s$file$form$hLevel$info$iso8859-1$namespace$namespace eval ::tcl::zlib {variable cmdcounter 0}$package ifneeded TclOO 1.1.0 {# Already present, OK?};namespace eval ::oo { variable version 1.1.0 };namespace eval ::oo { variable patchlevel 1.1.0 };$prefix$set$string$tcl$tcl::tommath$tcl_precision$threaded$unable to alloc %u bytes$wordSize$zlib$zlibVersion$%
                                                                                                                                                                                            • API String ID: 781835412-2957008561
                                                                                                                                                                                            • Opcode ID: 758d49a8ad800495cb58df4611fb30792a5914faafc9e1bd8f980830d6d06e86
                                                                                                                                                                                            • Instruction ID: 24450ab5205fcec0128dcd02fd0410b3befbf41f137bd2e1b7259e9265ae53d7
                                                                                                                                                                                            • Opcode Fuzzy Hash: 758d49a8ad800495cb58df4611fb30792a5914faafc9e1bd8f980830d6d06e86
                                                                                                                                                                                            • Instruction Fuzzy Hash: 8923A136709B8285E718DF10E860AA937A8FB44B88F488175DE6E0B7D9EF3DE554C350

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Window$Load$Icon$ClassCreateCursorHandleLongModuleRegisterShowUpdate
                                                                                                                                                                                            • String ID: 8.6$8.6.12$::ttk$::ttk::style$Button.border$P$Ttk$arrow$classic$default$downarrow$from$highlight$hsash$image$label$leftarrow$rightarrow$style$text$ttk::theme::classic$uparrow$vsash
                                                                                                                                                                                            • API String ID: 3723784198-449331163
                                                                                                                                                                                            • Opcode ID: 8f9ba403931917c369828b063368510c2b79a1c9ad4c486de7b4d73ff0a393d7
                                                                                                                                                                                            • Instruction ID: 3867ce5f015166fcdeef2733e2d1135bf3e08c447d2708861523d7575040b8da
                                                                                                                                                                                            • Opcode Fuzzy Hash: 8f9ba403931917c369828b063368510c2b79a1c9ad4c486de7b4d73ff0a393d7
                                                                                                                                                                                            • Instruction Fuzzy Hash: A8124E79B08B9691EB089F21E8609ED33A5FB48B84F404176DE6D177A8EF3CD655C340
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: strstr
                                                                                                                                                                                            • String ID: 1.1.0$1.2.11$2.0.1$8.6.12$::tcl::mathfunc$::tcl::mathop$::tcl::unsupported$::tcl::unsupported::corotype$::tcl::unsupported::timerate$Tcl$TclOO$athop::$cp1252$dian$engine$form$hLevel$iso8859-1$namespace eval ::tcl::zlib {variable cmdcounter 0}$package ifneeded TclOO 1.1.0 {# Already present, OK?};namespace eval ::oo { variable version 1.1.0 };namespace eval ::oo { variable patchlevel 1.1.0 };$set$tcl$tcl::tommath$tcl_precision$threaded$wordSize$zlib$zlibVersion
                                                                                                                                                                                            • API String ID: 1392478783-3286498808
                                                                                                                                                                                            • Opcode ID: 7af3f367cc95938951188627cf7bc93f7d2ad6c16a351b981bffddcd2eb48602
                                                                                                                                                                                            • Instruction ID: 0e9d7bab847157eb15de82806d36f110e19eccca2a1a2aac06782d8f9653c5cf
                                                                                                                                                                                            • Opcode Fuzzy Hash: 7af3f367cc95938951188627cf7bc93f7d2ad6c16a351b981bffddcd2eb48602
                                                                                                                                                                                            • Instruction Fuzzy Hash: 50A2C236B0978285EB189F11E860AB977A4FF48798F488075CA6E0B7D9EF3DE154C740

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            • Executed
                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                            control_flow_graph 1353 7ffdfac01470-7ffdfac0148a 1354 7ffdfac01516-7ffdfac0151e 1353->1354 1355 7ffdfac01490-7ffdfac01507 SendMessageW * 3 1353->1355 1358 7ffdfac01562-7ffdfac01569 1354->1358 1359 7ffdfac01520-7ffdfac0152e 1354->1359 1356 7ffdfac0150c-7ffdfac01511 1355->1356 1357 7ffdfac01509 1355->1357 1356->1354 1357->1356 1361 7ffdfac0156b-7ffdfac01579 1358->1361 1362 7ffdfac015b8-7ffdfac015bd 1358->1362 1359->1358 1360 7ffdfac01530-7ffdfac0153f 1359->1360 1363 7ffdfac0154b-7ffdfac01552 1360->1363 1364 7ffdfac01541 1360->1364 1361->1362 1365 7ffdfac0157b-7ffdfac0158a 1361->1365 1363->1358 1366 7ffdfac01554-7ffdfac01558 1363->1366 1364->1363 1367 7ffdfac0158c 1365->1367 1368 7ffdfac01596-7ffdfac0159d 1365->1368 1366->1358 1370 7ffdfac0155a-7ffdfac0155d call 7ffdfac0ecf0 1366->1370 1367->1368 1368->1362 1369 7ffdfac0159f-7ffdfac015a9 1368->1369 1369->1362 1371 7ffdfac015ab-7ffdfac0ed66 1369->1371 1370->1358 1375 7ffdfac0ed74-7ffdfac0ed97 GetFocus 1371->1375 1376 7ffdfac0ed68-7ffdfac0ed70 call 7ffdfacc6110 1371->1376 1378 7ffdfac0eda4 1375->1378 1379 7ffdfac0ed99-7ffdfac0eda2 GetForegroundWindow 1375->1379 1376->1375 1381 7ffdfac0edac-7ffdfac0edc6 1378->1381 1379->1378 1379->1381 1383 7ffdfac0eddd-7ffdfac0ede5 IsWindow 1381->1383 1384 7ffdfac0edc8-7ffdfac0edd9 1381->1384 1385 7ffdfac0f13f-7ffdfac0f165 SetWindowLongPtrW 1383->1385 1386 7ffdfac0edeb-7ffdfac0edfc 1383->1386 1384->1383 1388 7ffdfac0f167-7ffdfac0f176 SetWindowLongPtrW 1385->1388 1389 7ffdfac0f17c-7ffdfac0f18c SetParent 1385->1389 1386->1385 1388->1389 1391 7ffdfac0f192-7ffdfac0f1ca SendMessageW * 2 1389->1391 1392 7ffdfac0f26c-7ffdfac0f27d 1389->1392 1391->1392 1395 7ffdfac0f1d0-7ffdfac0f1d9 GetDesktopWindow 1391->1395 1393 7ffdfac0f27f-7ffdfac0f297 SendMessageW 1392->1393 1394 7ffdfac0f2f1-7ffdfac0f2fd 1392->1394 1393->1394 1396 7ffdfac0f299-7ffdfac0f2eb SendMessageW call 7ffdfac80d30 SendMessageW 1393->1396 1398 7ffdfac0f2ff-7ffdfac0f31c SetWindowPos 1394->1398 1399 7ffdfac0f322-7ffdfac0f337 call 7ffdfac0f600 1394->1399 1395->1392 1397 7ffdfac0f1df-7ffdfac0f1f7 SetWindowLongPtrW 1395->1397 1396->1394 1400 7ffdfac0f258-7ffdfac0f266 SetMenu DestroyWindow 1397->1400 1401 7ffdfac0f1f9-7ffdfac0f21b 1397->1401 1398->1399 1405 7ffdfac0f34e-7ffdfac0f359 1399->1405 1406 7ffdfac0f339-7ffdfac0f348 SendMessageW 1399->1406 1400->1392 1401->1400 1412 7ffdfac0f21d 1401->1412 1409 7ffdfac0f371-7ffdfac0f37b 1405->1409 1410 7ffdfac0f35b-7ffdfac0f36b SendMessageW 1405->1410 1406->1405 1413 7ffdfac0f37d-7ffdfac0f39b SendMessageW 1409->1413 1414 7ffdfac0f3e9-7ffdfac0f3f3 1409->1414 1410->1409 1415 7ffdfac0f220-7ffdfac0f224 1412->1415 1418 7ffdfac0f3dd-7ffdfac0f3e4 call 7ffdfac0d260 1413->1418 1419 7ffdfac0f39d-7ffdfac0f3d6 1413->1419 1420 7ffdfac0f40d-7ffdfac0f410 1414->1420 1421 7ffdfac0f3f5-7ffdfac0f406 SetMenu 1414->1421 1416 7ffdfac0f226-7ffdfac0f22d 1415->1416 1417 7ffdfac0f24c-7ffdfac0f256 1415->1417 1416->1417 1422 7ffdfac0f22f-7ffdfac0f246 SetParent 1416->1422 1417->1400 1417->1415 1418->1414 1419->1418 1425 7ffdfac0f46f-7ffdfac0f486 SetActiveWindow 1420->1425 1426 7ffdfac0f412-7ffdfac0f418 1420->1426 1421->1420 1422->1417 1431 7ffdfac0f49e-7ffdfac0f4ce call 7ffdfacef7a0 1425->1431 1429 7ffdfac0f462-7ffdfac0f469 1426->1429 1430 7ffdfac0f41a-7ffdfac0f428 1426->1430 1429->1425 1430->1429 1432 7ffdfac0f42a-7ffdfac0f42d 1430->1432 1433 7ffdfac0f430-7ffdfac0f434 1432->1433 1435 7ffdfac0f456-7ffdfac0f460 1433->1435 1436 7ffdfac0f436-7ffdfac0f43d 1433->1436 1435->1429 1435->1433 1436->1435 1438 7ffdfac0f43f-7ffdfac0f452 call 7ffdfac0ecf0 call 7ffdfac0f600 1436->1438 1438->1435
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: MessageSendWindow$FocusForegroundLong
                                                                                                                                                                                            • String ID: UpdateWrapper: Cannot find container window$UpdateWrapper: Container was destroyed
                                                                                                                                                                                            • API String ID: 2937761121-1156326135
                                                                                                                                                                                            • Opcode ID: 6f33b41d8d5e716aff5c90d28009d118c2cbea2f235fb22e7cc437d02e14caf5
                                                                                                                                                                                            • Instruction ID: 457ff843f5ad0e8be3f2948a159c19dfa23fea5c086a23f2e6d8178b1f3712b4
                                                                                                                                                                                            • Opcode Fuzzy Hash: 6f33b41d8d5e716aff5c90d28009d118c2cbea2f235fb22e7cc437d02e14caf5
                                                                                                                                                                                            • Instruction Fuzzy Hash: 0BF1403A70869286EB688F11D464BAD73A0FB84F94F088175CF6D4B798DF3CE4958750

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            • Executed
                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                            control_flow_graph 1612 7ffdfaecbf30-7ffdfaecbf81 call 7ffdfae9e7f0 call 7ffdfae90f20 call 7ffdfae90ab0 1619 7ffdfaeccabb-7ffdfaeccacc call 7ffdfae68bd0 1612->1619 1620 7ffdfaecbf87-7ffdfaecbfdf call 7ffdfaea1250 1612->1620 1625 7ffdfaeccacd-7ffdfaeccade call 7ffdfae68bd0 1619->1625 1626 7ffdfaecbfe9-7ffdfaecbff0 1620->1626 1627 7ffdfaecbfe1-7ffdfaecbfe4 call 7ffdfae64170 1620->1627 1637 7ffdfaeccadf-7ffdfaeccaf0 call 7ffdfae68bd0 1625->1637 1630 7ffdfaecc042-7ffdfaecc068 GetSystemInfo call 7ffdfae90f20 call 7ffdfae90ab0 1626->1630 1631 7ffdfaecbff2-7ffdfaecc01c GetModuleHandleW GetProcAddress 1626->1631 1627->1626 1630->1625 1645 7ffdfaecc06e-7ffdfaecc0ba call 7ffdfae90f20 call 7ffdfae90ab0 1630->1645 1634 7ffdfaecc02b-7ffdfaecc032 GetVersionExW 1631->1634 1635 7ffdfaecc01e-7ffdfaecc029 1631->1635 1636 7ffdfaecc038 1634->1636 1635->1634 1635->1636 1636->1630 1644 7ffdfaeccaf1-7ffdfaeccb02 call 7ffdfae68bd0 1637->1644 1650 7ffdfaeccb03-7ffdfaeccb11 call 7ffdfae68bd0 1644->1650 1655 7ffdfaeccaa9-7ffdfaeccaba call 7ffdfae68bd0 1645->1655 1656 7ffdfaecc0c0-7ffdfaecc106 call 7ffdfae90f20 call 7ffdfae90ab0 1645->1656 1658 7ffdfaeccb12-7ffdfaeccb23 call 7ffdfae68bd0 1650->1658 1655->1619 1668 7ffdfaeccb6c-7ffdfaeccb7f call 7ffdfae68bd0 1656->1668 1669 7ffdfaecc10c-7ffdfaecc155 call 7ffdfaea1250 1656->1669 1666 7ffdfaeccb24-7ffdfaeccb35 call 7ffdfae68bd0 1658->1666 1673 7ffdfaeccb36-7ffdfaeccb47 call 7ffdfae68bd0 1666->1673 1677 7ffdfaecc157-7ffdfaecc15a call 7ffdfae64170 1669->1677 1678 7ffdfaecc15f-7ffdfaecc169 1669->1678 1683 7ffdfaeccb48-7ffdfaeccb59 call 7ffdfae68bd0 1673->1683 1677->1678 1681 7ffdfaecc16b-7ffdfaecc16e call 7ffdfae64170 1678->1681 1682 7ffdfaecc173-7ffdfaecc176 1678->1682 1681->1682 1685 7ffdfaecc186-7ffdfaecc1a1 call 7ffdfae90f20 call 7ffdfae90ab0 1682->1685 1686 7ffdfaecc178-7ffdfaecc17c 1682->1686 1694 7ffdfaeccb5a-7ffdfaeccb6b call 7ffdfae68bd0 1683->1694 1685->1637 1697 7ffdfaecc1a7-7ffdfaecc1ed call 7ffdfae90f20 call 7ffdfae90ab0 1685->1697 1686->1685 1688 7ffdfaecc17e-7ffdfaecc181 call 7ffdfae64460 1686->1688 1688->1685 1694->1668 1697->1655 1703 7ffdfaecc1f3-7ffdfaecc23c call 7ffdfae90f20 call 7ffdfae90ab0 1697->1703 1703->1644 1708 7ffdfaecc242-7ffdfaecc28b call 7ffdfaea1250 1703->1708 1711 7ffdfaecc295-7ffdfaecc29f 1708->1711 1712 7ffdfaecc28d-7ffdfaecc290 call 7ffdfae64170 1708->1712 1714 7ffdfaecc2a9-7ffdfaecc2ac 1711->1714 1715 7ffdfaecc2a1-7ffdfaecc2a4 call 7ffdfae64170 1711->1715 1712->1711 1717 7ffdfaecc2bc-7ffdfaecc2ee wsprintfA 1714->1717 1718 7ffdfaecc2ae-7ffdfaecc2b2 1714->1718 1715->1714 1720 7ffdfaecc2f0-7ffdfaecc2f7 1717->1720 1718->1717 1719 7ffdfaecc2b4-7ffdfaecc2b7 call 7ffdfae64460 1718->1719 1719->1717 1720->1720 1722 7ffdfaecc2f9-7ffdfaecc306 call 7ffdfae90f20 1720->1722 1725 7ffdfaecc318-7ffdfaecc325 call 7ffdfae90ab0 1722->1725 1726 7ffdfaecc308-7ffdfaecc316 1722->1726 1731 7ffdfaecc327-7ffdfaecc329 1725->1731 1732 7ffdfaecc32f-7ffdfaecc34d memmove 1725->1732 1728 7ffdfaecc351-7ffdfaecc370 call 7ffdfae90f20 call 7ffdfae90ab0 1726->1728 1728->1655 1736 7ffdfaecc376-7ffdfaecc3bc call 7ffdfae90f20 call 7ffdfae90ab0 1728->1736 1731->1650 1731->1732 1732->1728 1736->1694 1741 7ffdfaecc3c2-7ffdfaecc417 call 7ffdfaea1250 1736->1741 1744 7ffdfaecc419-7ffdfaecc41c call 7ffdfae64170 1741->1744 1745 7ffdfaecc421-7ffdfaecc42b 1741->1745 1744->1745 1747 7ffdfaecc435-7ffdfaecc438 1745->1747 1748 7ffdfaecc42d-7ffdfaecc430 call 7ffdfae64170 1745->1748 1750 7ffdfaecc43a-7ffdfaecc43e 1747->1750 1751 7ffdfaecc448-7ffdfaecc450 1747->1751 1748->1747 1750->1751 1752 7ffdfaecc440-7ffdfaecc443 call 7ffdfae64460 1750->1752 1753 7ffdfaecc452-7ffdfaecc479 call 7ffdfaea0f80 1751->1753 1754 7ffdfaecc47e-7ffdfaecc4b2 call 7ffdfae90f20 call 7ffdfae90ab0 1751->1754 1752->1751 1753->1754 1754->1683 1761 7ffdfaecc4b8-7ffdfaecc4fb call 7ffdfae90f20 call 7ffdfae90ab0 1754->1761 1761->1673 1766 7ffdfaecc501-7ffdfaecc543 call 7ffdfaea0800 1761->1766 1769 7ffdfaecc545-7ffdfaecc548 call 7ffdfae64170 1766->1769 1770 7ffdfaecc54d-7ffdfaecc557 1766->1770 1769->1770 1772 7ffdfaecc559-7ffdfaecc55c call 7ffdfae64170 1770->1772 1773 7ffdfaecc561-7ffdfaecc564 1770->1773 1772->1773 1774 7ffdfaecc566-7ffdfaecc56a 1773->1774 1775 7ffdfaecc581-7ffdfaecc599 call 7ffdfae90f20 call 7ffdfae90ab0 1773->1775 1777 7ffdfaecc8d4-7ffdfaecc917 call 7ffdfaecbe40 call 7ffdfaea0f80 1774->1777 1778 7ffdfaecc570-7ffdfaecc57b call 7ffdfae64460 1774->1778 1775->1683 1789 7ffdfaecc59f-7ffdfaecc5e2 call 7ffdfae90f20 call 7ffdfae90ab0 1775->1789 1790 7ffdfaecc919 call 7ffdfae90c00 1777->1790 1791 7ffdfaecc91e-7ffdfaecc955 call 7ffdfae90f20 call 7ffdfae90ab0 1777->1791 1778->1775 1778->1777 1789->1694 1801 7ffdfaecc5e8-7ffdfaecc638 call 7ffdfaea0800 1789->1801 1790->1791 1791->1658 1802 7ffdfaecc95b-7ffdfaecc993 call 7ffdfae90f20 call 7ffdfae90ab0 1791->1802 1806 7ffdfaecc63a-7ffdfaecc63d call 7ffdfae64170 1801->1806 1807 7ffdfaecc642-7ffdfaecc64c 1801->1807 1802->1655 1817 7ffdfaecc999-7ffdfaecc9e2 call 7ffdfae90f20 call 7ffdfae90ab0 1802->1817 1806->1807 1810 7ffdfaecc656-7ffdfaecc659 1807->1810 1811 7ffdfaecc64e-7ffdfaecc651 call 7ffdfae64170 1807->1811 1815 7ffdfaecc65b-7ffdfaecc662 1810->1815 1816 7ffdfaecc684-7ffdfaecc69c call 7ffdfae90f20 call 7ffdfae90ab0 1810->1816 1811->1810 1818 7ffdfaecc671-7ffdfaecc67f call 7ffdfae9ce90 1815->1818 1819 7ffdfaecc664-7ffdfaecc66f call 7ffdfae64460 1815->1819 1816->1683 1830 7ffdfaecc6a2-7ffdfaecc6e5 call 7ffdfae90f20 call 7ffdfae90ab0 1816->1830 1817->1666 1833 7ffdfaecc9e8-7ffdfaecca49 call 7ffdfaea1250 1817->1833 1818->1816 1819->1816 1819->1818 1830->1668 1843 7ffdfaecc6eb-7ffdfaecc72f call 7ffdfaea0800 1830->1843 1839 7ffdfaecca4b-7ffdfaecca4e call 7ffdfae64170 1833->1839 1840 7ffdfaecca53-7ffdfaecca60 1833->1840 1839->1840 1841 7ffdfaecca6a-7ffdfaecca6d 1840->1841 1842 7ffdfaecca62-7ffdfaecca65 call 7ffdfae64170 1840->1842 1846 7ffdfaecca7d-7ffdfaeccaa8 call 7ffdfaedae00 1841->1846 1847 7ffdfaecca6f-7ffdfaecca73 1841->1847 1842->1841 1854 7ffdfaecc739-7ffdfaecc743 1843->1854 1855 7ffdfaecc731-7ffdfaecc734 call 7ffdfae64170 1843->1855 1847->1846 1849 7ffdfaecca75-7ffdfaecca78 call 7ffdfae64460 1847->1849 1849->1846 1857 7ffdfaecc745-7ffdfaecc748 call 7ffdfae64170 1854->1857 1858 7ffdfaecc74d-7ffdfaecc750 1854->1858 1855->1854 1857->1858 1859 7ffdfaecc77b-7ffdfaecc780 1858->1859 1860 7ffdfaecc752-7ffdfaecc759 1858->1860 1864 7ffdfaecc7aa-7ffdfaecc7c2 call 7ffdfae90f20 call 7ffdfae90ab0 1859->1864 1865 7ffdfaecc782-7ffdfaecc7a5 call 7ffdfaea0f80 1859->1865 1862 7ffdfaecc75b-7ffdfaecc766 call 7ffdfae64460 1860->1862 1863 7ffdfaecc768-7ffdfaecc776 call 7ffdfae9ce90 1860->1863 1862->1859 1862->1863 1863->1859 1864->1683 1875 7ffdfaecc7c8-7ffdfaecc80b call 7ffdfae90f20 call 7ffdfae90ab0 1864->1875 1865->1777 1875->1683 1880 7ffdfaecc811-7ffdfaecc856 call 7ffdfae90f20 call 7ffdfae90ab0 1875->1880 1880->1673 1885 7ffdfaecc85c-7ffdfaecc8a3 call 7ffdfaea1250 1880->1885 1888 7ffdfaecc8a5-7ffdfaecc8a8 call 7ffdfae64170 1885->1888 1889 7ffdfaecc8ad-7ffdfaecc8b7 1885->1889 1888->1889 1891 7ffdfaecc8b9-7ffdfaecc8bc call 7ffdfae64170 1889->1891 1892 7ffdfaecc8c1-7ffdfaecc8c4 1889->1892 1891->1892 1892->1777 1894 7ffdfaecc8c6-7ffdfaecc8ca 1892->1894 1894->1777 1895 7ffdfaecc8cc-7ffdfaecc8cf call 7ffdfae64460 1894->1895 1895->1777
                                                                                                                                                                                            APIs
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE90F20: TlsAlloc.KERNEL32 ref: 00007FFDFAE90F2D
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE90F20: TlsGetValue.KERNEL32 ref: 00007FFDFAE90F5B
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE90F20: GetLastError.KERNEL32 ref: 00007FFDFAE90F69
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE90F20: LeaveCriticalSection.KERNEL32 ref: 00007FFDFAE9100B
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE90F20: GetProcessHeap.KERNEL32 ref: 00007FFDFAE9101F
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE90F20: HeapAlloc.KERNEL32 ref: 00007FFDFAE91030
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90AC1
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90AEF
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90AFD
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90B3B
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90B49
                                                                                                                                                                                            • GetModuleHandleW.KERNEL32 ref: 00007FFDFAECBFF9
                                                                                                                                                                                            • GetProcAddress.KERNEL32 ref: 00007FFDFAECC009
                                                                                                                                                                                            • GetVersionExW.KERNEL32 ref: 00007FFDFAECC032
                                                                                                                                                                                            • wsprintfA.USER32 ref: 00007FFDFAECC2D9
                                                                                                                                                                                            • memmove.VCRUNTIME140 ref: 00007FFDFAECC344
                                                                                                                                                                                            • GetSystemInfo.KERNEL32 ref: 00007FFDFAECC047
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE64170: TlsGetValue.KERNEL32 ref: 00007FFDFAE641CD
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE64170: TlsGetValue.KERNEL32 ref: 00007FFDFAE642A9
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: AllocHeapValue$ErrorLastProcess$AddressCriticalHandleInfoLeaveModuleProcSectionSystemVersionmemmovewsprintf
                                                                                                                                                                                            • String ID: %d.%d$HOME$HOMEPATH$NTDLL$RtlGetVersion$env$machine$platform$rator$tcl_platform$unable to alloc %u bytes$user$windows
                                                                                                                                                                                            • API String ID: 3634442014-3862273396
                                                                                                                                                                                            • Opcode ID: a03c8b14c38e2878b1f200448c2081242791858a804dcb535d71f45b2b4c8288
                                                                                                                                                                                            • Instruction ID: 17f5ad002c3528ce56b7dbdf8beee742ea9a1ccbb32fed02272f679dbb7f77c8
                                                                                                                                                                                            • Opcode Fuzzy Hash: a03c8b14c38e2878b1f200448c2081242791858a804dcb535d71f45b2b4c8288
                                                                                                                                                                                            • Instruction Fuzzy Hash: A572BE32B097828AE709AF25D460AB937A0EF84B44F4481B5DA6F077DADF3EE551C740

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: CriticalSection$Initialize$Create$EnterEventLeavePerformanceQueryThread$CloseCounterFrequencyHandleObjectPrioritySingleWait
                                                                                                                                                                                            • String ID: gfffffff
                                                                                                                                                                                            • API String ID: 1584168963-1523873471
                                                                                                                                                                                            • Opcode ID: adc0f5351e5d77d2adf13962fef3e8524e85feb7c124935a7597a8cd33b13f5f
                                                                                                                                                                                            • Instruction ID: 8658441a333f69ab5b57a113d8a168dd598fff3d715136578e8dfb75aeeafcfa
                                                                                                                                                                                            • Opcode Fuzzy Hash: adc0f5351e5d77d2adf13962fef3e8524e85feb7c124935a7597a8cd33b13f5f
                                                                                                                                                                                            • Instruction Fuzzy Hash: 90513D71B18A4282EB089F65E874A7563A4FF847A4F4442B1D92E4BAE8DF3DE149C700

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Create$BitmapBrushPattern
                                                                                                                                                                                            • String ID: 8.6$Button.border$Combobox.focus$Scrollbar.trough$Ttk$alt$border$client$field$focus$slider$thumb$ttk::theme::winnative$winnative
                                                                                                                                                                                            • API String ID: 3280665104-2094136981
                                                                                                                                                                                            • Opcode ID: b31de2be146e75256c0e82ad79fddffdc6f373d01e20bd9515acc9596ba2253f
                                                                                                                                                                                            • Instruction ID: 82825a3dd953d02b85fc4e99f63d17943985a401914524a00354aaea513d412e
                                                                                                                                                                                            • Opcode Fuzzy Hash: b31de2be146e75256c0e82ad79fddffdc6f373d01e20bd9515acc9596ba2253f
                                                                                                                                                                                            • Instruction Fuzzy Hash: AE717E79B08B8681EB18DBA1F8609E963A4FB48B84F4445B6DDAD077D8EF3CE554C700

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            • Executed
                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                            control_flow_graph 2207 7ffdfac70740-7ffdfac7078f 2209 7ffdfac70848-7ffdfac70857 2207->2209 2210 7ffdfac70795-7ffdfac7079a 2207->2210 2211 7ffdfac7085d-7ffdfac70864 2209->2211 2212 7ffdfac7090e 2209->2212 2213 7ffdfac707a0-7ffdfac707c0 2210->2213 2214 7ffdfac70910-7ffdfac70917 2211->2214 2215 7ffdfac7086a-7ffdfac7086c 2211->2215 2212->2214 2220 7ffdfac707c2-7ffdfac707c5 2213->2220 2221 7ffdfac7082e-7ffdfac7083a 2213->2221 2216 7ffdfac7091c-7ffdfac7096d call 7ffdfacc6d90 call 7ffdfac8a220 2214->2216 2217 7ffdfac70919 2214->2217 2215->2214 2231 7ffdfac7096f 2216->2231 2232 7ffdfac709c0-7ffdfac709ca 2216->2232 2217->2216 2220->2221 2224 7ffdfac707c7-7ffdfac707cb 2220->2224 2221->2213 2222 7ffdfac70840 2221->2222 2222->2209 2226 7ffdfac707cd-7ffdfac707e2 strncmp 2224->2226 2227 7ffdfac707fb-7ffdfac70802 2224->2227 2226->2227 2229 7ffdfac707e4-7ffdfac707ea 2226->2229 2227->2221 2230 7ffdfac70804-7ffdfac70816 strncmp 2227->2230 2233 7ffdfac70871-7ffdfac70880 2229->2233 2234 7ffdfac707f0-7ffdfac707f9 2229->2234 2230->2221 2235 7ffdfac70818-7ffdfac7081e 2230->2235 2241 7ffdfac70972-7ffdfac70975 2231->2241 2243 7ffdfac709e3-7ffdfac709eb 2232->2243 2244 7ffdfac709cc-7ffdfac709cf 2232->2244 2245 7ffdfac70887-7ffdfac708ee 2233->2245 2236 7ffdfac70828-7ffdfac7082a 2234->2236 2237 7ffdfac708f3-7ffdfac70909 2235->2237 2238 7ffdfac70824 2235->2238 2236->2221 2237->2245 2238->2236 2246 7ffdfac70993-7ffdfac70996 2241->2246 2247 7ffdfac70977-7ffdfac70981 2241->2247 2251 7ffdfac709ed-7ffdfac70a07 2243->2251 2252 7ffdfac70a35-7ffdfac70a38 2243->2252 2244->2243 2250 7ffdfac709d1-7ffdfac709db 2244->2250 2259 7ffdfac70f33-7ffdfac70f4d 2245->2259 2248 7ffdfac70998-7ffdfac709a4 2246->2248 2249 7ffdfac709b6-7ffdfac709bb 2246->2249 2247->2246 2253 7ffdfac70983-7ffdfac7098a 2247->2253 2248->2249 2254 7ffdfac709a6-7ffdfac709ad 2248->2254 2255 7ffdfac70f2b 2249->2255 2250->2243 2263 7ffdfac70a0d 2251->2263 2264 7ffdfac70a09-7ffdfac70a0b 2251->2264 2256 7ffdfac70a80-7ffdfac70a91 call 7ffdfac710e0 2252->2256 2257 7ffdfac70a3a-7ffdfac70a4f 2252->2257 2253->2246 2254->2249 2255->2259 2269 7ffdfac70a93-7ffdfac70ad9 2256->2269 2270 7ffdfac70ade-7ffdfac70ae5 2256->2270 2271 7ffdfac70a51-7ffdfac70a55 2257->2271 2272 7ffdfac70a57 2257->2272 2268 7ffdfac70a0f-7ffdfac70a16 2263->2268 2264->2268 2273 7ffdfac70a31 2268->2273 2274 7ffdfac70a18-7ffdfac70a22 2268->2274 2269->2241 2276 7ffdfac70aeb-7ffdfac70aee 2270->2276 2277 7ffdfac70ce7 2270->2277 2275 7ffdfac70a5a-7ffdfac70a61 2271->2275 2272->2275 2273->2252 2274->2273 2279 7ffdfac70a24 2274->2279 2282 7ffdfac70a63-7ffdfac70a6d 2275->2282 2283 7ffdfac70a7c 2275->2283 2284 7ffdfac70af0-7ffdfac70af4 2276->2284 2285 7ffdfac70afa-7ffdfac70b16 2276->2285 2281 7ffdfac70cea-7ffdfac70ced 2277->2281 2279->2273 2286 7ffdfac70cf3-7ffdfac70cfa 2281->2286 2287 7ffdfac70df5-7ffdfac70dfd 2281->2287 2282->2283 2288 7ffdfac70a6f 2282->2288 2283->2256 2284->2285 2284->2287 2294 7ffdfac70b18-7ffdfac70b71 2285->2294 2295 7ffdfac70b76-7ffdfac70b90 2285->2295 2286->2287 2293 7ffdfac70d00-7ffdfac70d03 2286->2293 2290 7ffdfac70dff-7ffdfac70e09 2287->2290 2291 7ffdfac70e0d-7ffdfac70e16 2287->2291 2288->2283 2290->2291 2296 7ffdfac70e18 2291->2296 2297 7ffdfac70e25 2291->2297 2298 7ffdfac70d0f-7ffdfac70d43 call 7ffdfac71830 2293->2298 2299 7ffdfac70d05-7ffdfac70d09 2293->2299 2294->2241 2295->2241 2313 7ffdfac70b96-7ffdfac70bba 2295->2313 2296->2297 2301 7ffdfac70e1a-7ffdfac70e23 2296->2301 2302 7ffdfac70e29-7ffdfac70e30 2297->2302 2298->2241 2309 7ffdfac70d49-7ffdfac70d5f call 7ffdfac710e0 2298->2309 2299->2287 2299->2298 2301->2297 2301->2302 2306 7ffdfac70e43-7ffdfac70e5b 2302->2306 2307 7ffdfac70e32-7ffdfac70e41 call 7ffdfac73c40 2302->2307 2311 7ffdfac70e5d 2306->2311 2312 7ffdfac70e85-7ffdfac70e8c 2306->2312 2307->2306 2309->2269 2328 7ffdfac70d65-7ffdfac70d71 2309->2328 2319 7ffdfac70e60-7ffdfac70e83 2311->2319 2315 7ffdfac70e8e-7ffdfac70e98 2312->2315 2316 7ffdfac70eaa-7ffdfac70ead 2312->2316 2326 7ffdfac70cd0-7ffdfac70ce2 2313->2326 2327 7ffdfac70bc0-7ffdfac70bf9 call 7ffdfac71480 2313->2327 2315->2316 2322 7ffdfac70e9a-7ffdfac70ea1 2315->2322 2323 7ffdfac70eaf-7ffdfac70ebb 2316->2323 2324 7ffdfac70ecd-7ffdfac70efd 2316->2324 2319->2312 2322->2316 2323->2324 2329 7ffdfac70ebd-7ffdfac70ec4 2323->2329 2331 7ffdfac70eff-7ffdfac70f06 2324->2331 2332 7ffdfac70f29 2324->2332 2326->2241 2337 7ffdfac70bfe-7ffdfac70c00 2327->2337 2334 7ffdfac70d73-7ffdfac70d76 2328->2334 2335 7ffdfac70d9e-7ffdfac70ddb 2328->2335 2329->2324 2331->2332 2336 7ffdfac70f08 2331->2336 2332->2255 2338 7ffdfac70d8b-7ffdfac70d9b 2334->2338 2339 7ffdfac70d78-7ffdfac70d88 2334->2339 2335->2241 2347 7ffdfac70de1-7ffdfac70df1 2335->2347 2342 7ffdfac70f10-7ffdfac70f18 2336->2342 2337->2326 2343 7ffdfac70c06-7ffdfac70c1c call 7ffdfac710e0 2337->2343 2338->2335 2339->2338 2344 7ffdfac70f1a-7ffdfac70f21 2342->2344 2345 7ffdfac70f25 2342->2345 2354 7ffdfac70c1e-7ffdfac70c30 2343->2354 2355 7ffdfac70c35-7ffdfac70c3e 2343->2355 2344->2342 2351 7ffdfac70f23 2344->2351 2345->2332 2347->2287 2351->2332 2354->2269 2356 7ffdfac70c40-7ffdfac70c43 2355->2356 2357 7ffdfac70c58-7ffdfac70cb0 2355->2357 2356->2357 2359 7ffdfac70c45-7ffdfac70c55 2356->2359 2357->2241 2363 7ffdfac70cb6-7ffdfac70cce 2357->2363 2359->2357 2363->2281
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000000), ref: 00007FFDFAC707DA
                                                                                                                                                                                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000000), ref: 00007FFDFAC7080E
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: strncmp
                                                                                                                                                                                            • String ID: -data$-format$-translation$IMAGE$MALLOC$MISSING_VALUE$PHOTO$PHOTO_FILE$SAFE$binary$can't get image from a file in a safe interpreter$not enough free memory for image buffer$value for "-data" missing$value for "-format" missing
                                                                                                                                                                                            • API String ID: 1114863663-986971618
                                                                                                                                                                                            • Opcode ID: f27639e0dd34256d95672fb04afeee24389fbed3fce2a28689607d833f8994eb
                                                                                                                                                                                            • Instruction ID: d3d465c5cf187cfa68496f42074f35cde65dd8d2767a95a60beeb4160c0ee21a
                                                                                                                                                                                            • Opcode Fuzzy Hash: f27639e0dd34256d95672fb04afeee24389fbed3fce2a28689607d833f8994eb
                                                                                                                                                                                            • Instruction Fuzzy Hash: A4327C7AB08B4686EB58CF15E464A6E77A0FB48B84F054076CE6D877A8DF3CE560C700
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: strchr
                                                                                                                                                                                            • String ID: %s called with shared object$/$Tcl_SetObjLength$Tcl_SetObjLength: negative length requested: %d (integer overflow?)$UpdateStringProc for type '%s' failed to create a valid string rep$UpdateStringProc should not be invoked for type %s$max length for a Tcl unicode value (%d chars) exceeded$unable to alloc %u bytes$unable to realloc %u bytes
                                                                                                                                                                                            • API String ID: 2830005266-3012010624
                                                                                                                                                                                            • Opcode ID: eed1fc1d050dc0b59f4c6e2ada0c61bfb7098757fa7dc6c0017ed97523d47358
                                                                                                                                                                                            • Instruction ID: be24f0066f76caada0b52809ff7c784d58d0b7a4d3f955cfa3139deeefa6da8f
                                                                                                                                                                                            • Opcode Fuzzy Hash: eed1fc1d050dc0b59f4c6e2ada0c61bfb7098757fa7dc6c0017ed97523d47358
                                                                                                                                                                                            • Instruction Fuzzy Hash: 1F52B361B18A4686EF6CBF1591B0A7927A0AF44B84F4848B5DA3F477DDDF2EF8518300
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Window$Rect$MessageMoveSend$AdjustClientDrawIconicMenuMetricsSystemZoomed
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 722483491-0
                                                                                                                                                                                            • Opcode ID: 5dc5ee2d82364ab45c3e1c4c4de4c407ddad4bd6f2bd69f41bdf99dfc362b757
                                                                                                                                                                                            • Instruction ID: 2e0c80fc67041799a4c32c7ac2bcaad3c9470de09d4585b2f11700cd4767f222
                                                                                                                                                                                            • Opcode Fuzzy Hash: 5dc5ee2d82364ab45c3e1c4c4de4c407ddad4bd6f2bd69f41bdf99dfc362b757
                                                                                                                                                                                            • Instruction Fuzzy Hash: 84C19CBB708682CAEB18CF29D554B6D77A1FB84B88F184135DE595B69CCF38E840CB50
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Heapmemchrmemmove$AllocErrorFreeLastProcessValue_errno
                                                                                                                                                                                            • String ID: Reuse of ChannelBuffer! %p$UpdateStringProc for type '%s' failed to create a valid string rep$UpdateStringProc should not be invoked for type %s$unable to alloc %u bytes$unknown output translation requested
                                                                                                                                                                                            • API String ID: 3069104407-1795497851
                                                                                                                                                                                            • Opcode ID: a1ec4b53e4aec21cba14050994a6731f8f1629a87d884a0874d66016ca6dd513
                                                                                                                                                                                            • Instruction ID: 1e2c67f66956ab5d0950f987a4ac6b809acf34be40b95201bee2c6a83f0c4931
                                                                                                                                                                                            • Opcode Fuzzy Hash: a1ec4b53e4aec21cba14050994a6731f8f1629a87d884a0874d66016ca6dd513
                                                                                                                                                                                            • Instruction Fuzzy Hash: 9812B272B0878186EB68AF25E460B6AB7E0FB84794F044175DE6E47AD8DF3DE454CB00
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: DataFont$ObjectSelect$CharsetText
                                                                                                                                                                                            • String ID: cmap$pamc
                                                                                                                                                                                            • API String ID: 447340330-4234804082
                                                                                                                                                                                            • Opcode ID: bbebad4b024f1df0a2acf8f01e802d18b25ea7676657321c3d9a359de27d5bdf
                                                                                                                                                                                            • Instruction ID: 497dbdf7a282ec36152635ea6a1bd9f8c650aae8b84cf73bae6a5506e4a90a1e
                                                                                                                                                                                            • Opcode Fuzzy Hash: bbebad4b024f1df0a2acf8f01e802d18b25ea7676657321c3d9a359de27d5bdf
                                                                                                                                                                                            • Instruction Fuzzy Hash: 9FB1117AB182A287D7588F16E410A7EB7B5FB94B40F448031EF9983B98DB7CD441CB00
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            • FindResourceW() failed for buttons bitmap resource, resources in tk_base.rc must be linked into Tk dll or static executable, xrefs: 00007FFDFABF7DFC
                                                                                                                                                                                            • buttons, xrefs: 00007FFDFABF7DDD
                                                                                                                                                                                            • abcdefghijklmnopqurstuvwzyABCDEFGHIJKLMNOPQURSTUVWZY, xrefs: 00007FFDFABF7FFC
                                                                                                                                                                                            • Tk_SizeOfBitmap received unknown bitmap argument, xrefs: 00007FFDFABF7F42
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Resource$FindHandleLoadLockModulememcpy
                                                                                                                                                                                            • String ID: FindResourceW() failed for buttons bitmap resource, resources in tk_base.rc must be linked into Tk dll or static executable$Tk_SizeOfBitmap received unknown bitmap argument$abcdefghijklmnopqurstuvwzyABCDEFGHIJKLMNOPQURSTUVWZY$buttons
                                                                                                                                                                                            • API String ID: 770267298-1510936104
                                                                                                                                                                                            • Opcode ID: 2818e542f6cf3efa9cf040ec6d97d7b7f7a28b221edcee25c938e3fc45d5d691
                                                                                                                                                                                            • Instruction ID: c95a1b36b127db649f27c607012ccbc49f748717a0a80bfaca67b474dfc05233
                                                                                                                                                                                            • Opcode Fuzzy Hash: 2818e542f6cf3efa9cf040ec6d97d7b7f7a28b221edcee25c938e3fc45d5d691
                                                                                                                                                                                            • Instruction Fuzzy Hash: 76020576B08A9186DB19CF69E864B6977A4FF48B88F484275DE2D43798EF38E440C700
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _stricmp$Release
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 2376057513-0
                                                                                                                                                                                            • Opcode ID: 4a225cf625adf7aef314a519f2c88def5144fba9f350ed435d72d22fa29e3833
                                                                                                                                                                                            • Instruction ID: 17e865982ea7b012de594c6848f6b9f1fd0e9f841e0fa6bfd7e9bdd691d0f376
                                                                                                                                                                                            • Opcode Fuzzy Hash: 4a225cf625adf7aef314a519f2c88def5144fba9f350ed435d72d22fa29e3833
                                                                                                                                                                                            • Instruction Fuzzy Hash: 3802AD29B09B9681EB148B15E5647AE67B5FB45BE4F088271DE6E877D8DF3CE401C300
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • memmove.VCRUNTIME140 ref: 00007FFDFAD96C36
                                                                                                                                                                                            • strstr.VCRUNTIME140 ref: 00007FFDFAD96D10
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE90F20: TlsAlloc.KERNEL32 ref: 00007FFDFAE90F2D
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE90F20: TlsGetValue.KERNEL32 ref: 00007FFDFAE90F5B
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE90F20: GetLastError.KERNEL32 ref: 00007FFDFAE90F69
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE90F20: LeaveCriticalSection.KERNEL32 ref: 00007FFDFAE9100B
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE90F20: GetProcessHeap.KERNEL32 ref: 00007FFDFAE9101F
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE90F20: HeapAlloc.KERNEL32 ref: 00007FFDFAE91030
                                                                                                                                                                                              • Part of subcall function 00007FFDFAD97F50: TlsGetValue.KERNEL32 ref: 00007FFDFAD97F90
                                                                                                                                                                                              • Part of subcall function 00007FFDFAD97F50: _localtime64.API-MS-WIN-CRT-TIME-L1-1-0 ref: 00007FFDFAD97FFE
                                                                                                                                                                                              • Part of subcall function 00007FFDFAD97F50: LeaveCriticalSection.KERNEL32 ref: 00007FFDFAD98014
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE65620: TlsAlloc.KERNEL32(?,?,?,00007FFDFAE4C978,?,?,?,?,00000001,?,00000000,00007FFDFAD8D42E), ref: 00007FFDFAE65631
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE65620: TlsGetValue.KERNEL32(?,?,?,00007FFDFAE4C978,?,?,?,?,00000001,?,00000000,00007FFDFAD8D42E), ref: 00007FFDFAE6565F
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE65620: GetLastError.KERNEL32(?,?,?,00007FFDFAE4C978,?,?,?,?,00000001,?,00000000,00007FFDFAD8D42E), ref: 00007FFDFAE6566D
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE65620: LeaveCriticalSection.KERNEL32(?,?,?,00007FFDFAE4C978,?,?,?,?,00000001,?,00000000,00007FFDFAD8D42E), ref: 00007FFDFAE6570D
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE65620: GetProcessHeap.KERNEL32(?,?,?,00007FFDFAE4C978,?,?,?,?,00000001,?,00000000,00007FFDFAD8D42E), ref: 00007FFDFAE65721
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE65620: HeapAlloc.KERNEL32(?,?,?,00007FFDFAE4C978,?,?,?,?,00000001,?,00000000,00007FFDFAD8D42E), ref: 00007FFDFAE65732
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE65620: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFDFAE4C978,?,?,?,?,00000001,?,00000000,00007FFDFAD8D42E), ref: 00007FFDFAE65825
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE65620: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FFDFAE4C978,?,?,?,?,00000001,?,00000000,00007FFDFAD8D42E), ref: 00007FFDFAE6584E
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE65620: GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FFDFAE4C978,?,?,?,?,00000001,?,00000000,00007FFDFAD8D42E), ref: 00007FFDFAE6585C
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE65620: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,00007FFDFAE4C978,?,?,?,?,00000001,?,00000000,00007FFDFAD8D42E), ref: 00007FFDFAE6589F
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE65620: HeapFree.KERNEL32(?,?,?,?,?,?,?,00007FFDFAE4C978,?,?,?,?,00000001,?,00000000,00007FFDFAD8D42E), ref: 00007FFDFAE658AD
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Heap$Alloc$Value$CriticalErrorLastLeaveProcessSection$Free_localtime64memmovestrstr
                                                                                                                                                                                            • String ID: clock$dict tzdata changeover$lock::$seconds tzdata changeover$unable to alloc %u bytes
                                                                                                                                                                                            • API String ID: 2433263316-2716670965
                                                                                                                                                                                            • Opcode ID: a4dad76fe1b8b725fbbbc6dccc5ff685972369796ad5310106dca09a93a60850
                                                                                                                                                                                            • Instruction ID: 1ec194de3ada6e4a5149da0d9cfab6c69f0d4619b4f311f9084487abe2d657ba
                                                                                                                                                                                            • Opcode Fuzzy Hash: a4dad76fe1b8b725fbbbc6dccc5ff685972369796ad5310106dca09a93a60850
                                                                                                                                                                                            • Instruction Fuzzy Hash: E252C272B0874286EB289F61D860BAD63A5FB48BC8F404476DE6E577D9EE3DE444C340
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: memmove
                                                                                                                                                                                            • String ID: $Unexpected token type in TclCompileTokens: %d; %.*s$bad stack depth computations: is %i, should be %i$unable to alloc %u bytes$unable to realloc %u bytes
                                                                                                                                                                                            • API String ID: 2162964266-2435792223
                                                                                                                                                                                            • Opcode ID: 7ce65e731e5536861fdcc70299f5edec7d53c98dce512376c88aa77de850d066
                                                                                                                                                                                            • Instruction ID: 30a171066ac2a6b644d0a385c29f7fdf67e4b2b4716db5c1269274b019324b44
                                                                                                                                                                                            • Opcode Fuzzy Hash: 7ce65e731e5536861fdcc70299f5edec7d53c98dce512376c88aa77de850d066
                                                                                                                                                                                            • Instruction Fuzzy Hash: 8052AE32B0868186EB149F29D8A077E77A0FB84B98F544176DA6E4779DEF3CD841CB40
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • TlsAlloc.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F0FA
                                                                                                                                                                                            • TlsGetValue.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F123
                                                                                                                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F131
                                                                                                                                                                                            • memmove.VCRUNTIME140(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F1CB
                                                                                                                                                                                            • TlsAlloc.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F1D9
                                                                                                                                                                                            • GetProcessHeap.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F20C
                                                                                                                                                                                            • HeapReAlloc.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F21D
                                                                                                                                                                                            • TlsGetValue.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F24C
                                                                                                                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F25A
                                                                                                                                                                                            • GetProcessHeap.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F298
                                                                                                                                                                                            • HeapFree.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F2A6
                                                                                                                                                                                            • TlsAlloc.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F367
                                                                                                                                                                                            • TlsGetValue.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F390
                                                                                                                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F39E
                                                                                                                                                                                            • GetProcessHeap.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F46E
                                                                                                                                                                                            • memmove.VCRUNTIME140(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F4CF
                                                                                                                                                                                            • TlsAlloc.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F4DD
                                                                                                                                                                                            • TlsGetValue.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F506
                                                                                                                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F514
                                                                                                                                                                                            • GetProcessHeap.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F552
                                                                                                                                                                                            • HeapFree.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F560
                                                                                                                                                                                            • TlsAlloc.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F5FC
                                                                                                                                                                                            • TlsGetValue.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F625
                                                                                                                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F633
                                                                                                                                                                                            • GetProcessHeap.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F6D2
                                                                                                                                                                                            • HeapReAlloc.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F6E3
                                                                                                                                                                                            • HeapReAlloc.KERNEL32(?,?,?,?,?,00000000,00007FFDFAE837F5,?,00000000,00000000,?,?,?,00000000,00007FFDFAE8077E), ref: 00007FFDFAE7F47F
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90AC1
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90AEF
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90AFD
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90B3B
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90B49
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Heap$Alloc$ErrorLastProcessValue$Freememmove
                                                                                                                                                                                            • String ID: TlsGetValue failed from TclpGetAllocCache$alloc: invalid block: %p: %x %x$could not allocate thread local storage$unable to realloc %u bytes
                                                                                                                                                                                            • API String ID: 1243927888-2645962790
                                                                                                                                                                                            • Opcode ID: dcb6bdfd1a9f7a3a0f7181a1f15f330ac2da9cb9fa203569f31fca04382a8945
                                                                                                                                                                                            • Instruction ID: b87802d6adff40a2bc82ec7ac50ca6b4d3e7d42e81599dd74b9c031424a0b58a
                                                                                                                                                                                            • Opcode Fuzzy Hash: dcb6bdfd1a9f7a3a0f7181a1f15f330ac2da9cb9fa203569f31fca04382a8945
                                                                                                                                                                                            • Instruction Fuzzy Hash: 6242BF31B0874286EB58AB25E4209B837A0EF48B94F1481B5DA3F477D9DF3EE855C710

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Object$CreateDeleteFontIndirect$InfoParametersSystem$CapsDeviceReleaseStockmemset
                                                                                                                                                                                            • String ID: TkCaptionFont$TkDefaultFont$TkFixedFont$TkHeadingFont$TkIconFont$TkMenuFont$TkSmallCaptionFont$TkTextFont$TkTooltipFont
                                                                                                                                                                                            • API String ID: 3615235001-2508811397
                                                                                                                                                                                            • Opcode ID: 9ccc85a36dcb20fc4ec8aa18b0c8cc15d1766b04439c597cd0f8507ce402052f
                                                                                                                                                                                            • Instruction ID: 6e52b14ba57182dccfb5bef844ff9b46c6c0b497b291a1e5cbd01419b1c95114
                                                                                                                                                                                            • Opcode Fuzzy Hash: 9ccc85a36dcb20fc4ec8aa18b0c8cc15d1766b04439c597cd0f8507ce402052f
                                                                                                                                                                                            • Instruction Fuzzy Hash: 38813B25B0469386EB18DB62EC24AED6360FF49F88F448075EA2E57799DF3CE149C740

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            • Executed
                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                            control_flow_graph 1443 7ffdfae908b0-7ffdfae908c7 1444 7ffdfae909e9-7ffdfae909f4 call 7ffdfaed9a50 1443->1444 1445 7ffdfae908cd-7ffdfae908d4 1443->1445 1451 7ffdfae909f6-7ffdfae90a13 GetProcessHeap HeapAlloc 1444->1451 1452 7ffdfae90a71-7ffdfae90a83 1444->1452 1447 7ffdfae908d6-7ffdfae908e3 InitializeCriticalSection 1445->1447 1448 7ffdfae908ed-7ffdfae90901 call 7ffdfaed95c0 1445->1448 1447->1448 1456 7ffdfae90907-7ffdfae90918 malloc 1448->1456 1457 7ffdfae909dc-7ffdfae909e3 LeaveCriticalSection 1448->1457 1454 7ffdfae90a15-7ffdfae90a6f memset call 7ffdfaed95c0 LeaveCriticalSection GetCurrentThreadId TlsSetValue 1451->1454 1455 7ffdfae90a84-7ffdfae90a90 call 7ffdfae68bd0 1451->1455 1454->1452 1466 7ffdfae90a9e-7ffdfae90ada call 7ffdfae68bd0 TlsAlloc 1454->1466 1461 7ffdfae90a91-7ffdfae90a9d call 7ffdfae68bd0 1455->1461 1460 7ffdfae9091e-7ffdfae90943 InitializeCriticalSection malloc 1456->1460 1456->1461 1457->1444 1460->1461 1464 7ffdfae90949-7ffdfae90966 InitializeCriticalSection 1460->1464 1461->1466 1467 7ffdfae90970-7ffdfae9099a 1464->1467 1476 7ffdfae90ae0-7ffdfae90afb TlsGetValue 1466->1476 1477 7ffdfae90be4-7ffdfae90bf0 call 7ffdfae68bd0 1466->1477 1470 7ffdfae909a6-7ffdfae909ba malloc 1467->1470 1471 7ffdfae9099c-7ffdfae909a4 1467->1471 1470->1461 1473 7ffdfae909c0-7ffdfae909da InitializeCriticalSection 1470->1473 1471->1470 1473->1457 1473->1467 1481 7ffdfae90b0b-7ffdfae90b13 1476->1481 1482 7ffdfae90afd-7ffdfae90b05 GetLastError 1476->1482 1483 7ffdfae90bf1-7ffdfae90bff call 7ffdfae68bd0 1477->1483 1484 7ffdfae90b15-7ffdfae90b1a call 7ffdfae908b0 1481->1484 1485 7ffdfae90b1d-7ffdfae90b55 GetProcessHeap HeapAlloc 1481->1485 1482->1481 1482->1483 1484->1485 1491 7ffdfae90b57-7ffdfae90bc6 1485->1491 1492 7ffdfae90b9f-7ffdfae90ba1 1485->1492 1494 7ffdfae90bca-7ffdfae90be3 1491->1494 1492->1494
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: CriticalSection$Initialize$malloc$AllocHeapLeaveValue$CurrentErrorLastProcessThreadmemset
                                                                                                                                                                                            • String ID: TlsGetValue failed from TclpGetAllocCache$TlsSetValue failed from TclpSetAllocCache$alloc: could not allocate new cache$could not allocate lock$could not allocate thread local storage
                                                                                                                                                                                            • API String ID: 2510295087-2583951768
                                                                                                                                                                                            • Opcode ID: 7739486442db3a8f0720ca2a92c364d070dea4b4dea3eb3c19542412d3bcd4d7
                                                                                                                                                                                            • Instruction ID: 7a70397b4c21125076a94b52969307a1f6c296bb591b53c5bae9fea721dba79a
                                                                                                                                                                                            • Opcode Fuzzy Hash: 7739486442db3a8f0720ca2a92c364d070dea4b4dea3eb3c19542412d3bcd4d7
                                                                                                                                                                                            • Instruction Fuzzy Hash: B5818731B09B0285FB58AB25E874A7923A0EF88794F5441B5D96F477ECEE3EE445C700

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            • Executed
                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                            control_flow_graph 1495 7ffdfac5894d-7ffdfac5895b 1496 7ffdfac58960-7ffdfac58986 1495->1496 1498 7ffdfac58ac0-7ffdfac58ac8 1496->1498 1499 7ffdfac5898c-7ffdfac58990 1496->1499 1498->1496 1502 7ffdfac58ace-7ffdfac58ad6 1498->1502 1500 7ffdfac58992-7ffdfac58995 1499->1500 1501 7ffdfac589cf-7ffdfac589d3 1499->1501 1500->1501 1503 7ffdfac58997-7ffdfac589ac strncmp 1500->1503 1506 7ffdfac58a10-7ffdfac58a14 1501->1506 1507 7ffdfac589d5-7ffdfac589d8 1501->1507 1504 7ffdfac58aea-7ffdfac58b9f call 7ffdfacc6d90 call 7ffdfacc5750 1502->1504 1505 7ffdfac58ad8-7ffdfac58ae6 1502->1505 1511 7ffdfac589ae-7ffdfac589c3 1503->1511 1512 7ffdfac589c8 1503->1512 1537 7ffdfac58f00 1504->1537 1538 7ffdfac58ba5-7ffdfac58bb2 1504->1538 1505->1504 1509 7ffdfac58a4f-7ffdfac58a53 1506->1509 1510 7ffdfac58a16-7ffdfac58a1a 1506->1510 1507->1506 1508 7ffdfac589da-7ffdfac589ef strncmp 1507->1508 1514 7ffdfac589f1-7ffdfac58a04 1508->1514 1515 7ffdfac58a09 1508->1515 1517 7ffdfac58a8e-7ffdfac58a92 1509->1517 1518 7ffdfac58a55-7ffdfac58a59 1509->1518 1510->1509 1516 7ffdfac58a1c-7ffdfac58a31 strncmp 1510->1516 1511->1498 1512->1501 1514->1498 1515->1506 1521 7ffdfac58a33-7ffdfac58a46 1516->1521 1522 7ffdfac58a48 1516->1522 1517->1498 1520 7ffdfac58a94-7ffdfac58aa9 strncmp 1517->1520 1518->1517 1524 7ffdfac58a5b-7ffdfac58a70 strncmp 1518->1524 1520->1498 1527 7ffdfac58aab-7ffdfac58abb 1520->1527 1521->1498 1522->1509 1528 7ffdfac58a72-7ffdfac58a85 1524->1528 1529 7ffdfac58a87 1524->1529 1527->1498 1528->1498 1529->1517 1541 7ffdfac58f05-7ffdfac58f2b 1537->1541 1539 7ffdfac58bb4-7ffdfac58bd0 call 7ffdfac8bc70 1538->1539 1540 7ffdfac58be6-7ffdfac58bfd call 7ffdfac5c210 call 7ffdfac8c2e0 1538->1540 1539->1540 1546 7ffdfac58bd2-7ffdfac58bde 1539->1546 1549 7ffdfac58c1d-7ffdfac58c22 1540->1549 1550 7ffdfac58bff-7ffdfac58c10 call 7ffdfac8bc70 1540->1550 1546->1540 1551 7ffdfac58c24-7ffdfac58c34 call 7ffdfac01650 1549->1551 1552 7ffdfac58c3a-7ffdfac58c42 1549->1552 1554 7ffdfac58c15-7ffdfac58c1b 1550->1554 1551->1552 1562 7ffdfac58ef8-7ffdfac58efb call 7ffdfacc5a30 1551->1562 1556 7ffdfac58c44-7ffdfac58c5a call 7ffdfac8bc70 1552->1556 1557 7ffdfac58c5d-7ffdfac58c60 1552->1557 1554->1549 1554->1552 1556->1557 1560 7ffdfac58c62-7ffdfac58c7e call 7ffdfac8bc70 1557->1560 1561 7ffdfac58c80-7ffdfac58c8d 1557->1561 1560->1561 1573 7ffdfac58c8f 1560->1573 1565 7ffdfac58c92-7ffdfac58c95 1561->1565 1562->1537 1566 7ffdfac58cff-7ffdfac58d02 1565->1566 1567 7ffdfac58c97-7ffdfac58cbe call 7ffdfacc3cf0 1565->1567 1571 7ffdfac58d04-7ffdfac58d1a call 7ffdfacc43c0 1566->1571 1572 7ffdfac58d2b-7ffdfac58d3f 1566->1572 1567->1562 1577 7ffdfac58cc4-7ffdfac58cce 1567->1577 1571->1562 1584 7ffdfac58d20-7ffdfac58d26 call 7ffdfacc6800 1571->1584 1579 7ffdfac58d41-7ffdfac58d4b 1572->1579 1580 7ffdfac58d4d-7ffdfac58d6b 1572->1580 1573->1565 1577->1566 1583 7ffdfac58cd0-7ffdfac58cf4 1577->1583 1579->1580 1581 7ffdfac58d82-7ffdfac58e06 memset 1579->1581 1580->1581 1582 7ffdfac58d6d-7ffdfac58d74 1580->1582 1590 7ffdfac58e19-7ffdfac58e64 call 7ffdfac507c0 call 7ffdfac47a80 1581->1590 1591 7ffdfac58e08-7ffdfac58e12 1581->1591 1582->1581 1585 7ffdfac58d76-7ffdfac58d7d 1582->1585 1583->1566 1586 7ffdfac58cf6-7ffdfac58cf9 1583->1586 1584->1572 1585->1581 1586->1566 1590->1562 1596 7ffdfac58e6a-7ffdfac58e8f call 7ffdfac59470 1590->1596 1591->1590 1596->1562 1599 7ffdfac58e91-7ffdfac58e97 1596->1599 1600 7ffdfac58e9d-7ffdfac58ea5 1599->1600 1601 7ffdfac58f58-7ffdfac58f5c 1599->1601 1604 7ffdfac58f50-7ffdfac58f53 call 7ffdfac018d0 1600->1604 1605 7ffdfac58eab-7ffdfac58eef 1600->1605 1602 7ffdfac58f5e-7ffdfac58f6c 1601->1602 1603 7ffdfac58f75-7ffdfac58f92 call 7ffdfac89fb0 1601->1603 1602->1603 1603->1541 1604->1601 1605->1562
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: strncmp
                                                                                                                                                                                            • String ID: -class$-colormap$-screen$-use$-visual$CONTAINMENT$Class$Colormap$FRAME$Use$Visual$class$colormap$use$v$visual$windows cannot have both the -use and the -container option set$"6
                                                                                                                                                                                            • API String ID: 1114863663-646938501
                                                                                                                                                                                            • Opcode ID: ebc5a30571de33580cd878f900075a703db8a042d7c1d06f1c737def9735c170
                                                                                                                                                                                            • Instruction ID: c5a7c7c4468d6d778be1ceb607733dafe663dcfff4b8b2ac12762c2b7e6fc2ee
                                                                                                                                                                                            • Opcode Fuzzy Hash: ebc5a30571de33580cd878f900075a703db8a042d7c1d06f1c737def9735c170
                                                                                                                                                                                            • Instruction Fuzzy Hash: 04F16E39B09B8289EB588B12E860BBD63A1FB45B84F484075DE6E477D8EF3CE514C740

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            • Executed
                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                            control_flow_graph 1913 7ffdfac695a0-7ffdfac695d9 call 7ffdfac68a50 1915 7ffdfac695de-7ffdfac695e1 1913->1915 1916 7ffdfac695e7-7ffdfac695fd memcmp 1915->1916 1917 7ffdfac699c5 1915->1917 1918 7ffdfac69603-7ffdfac69607 1916->1918 1919 7ffdfac69690-7ffdfac696af call 7ffdfac68fb0 1916->1919 1920 7ffdfac699ca-7ffdfac699ea call 7ffdfacef7a0 1917->1920 1922 7ffdfac6965f-7ffdfac6968b 1918->1922 1923 7ffdfac69609-7ffdfac69641 call 7ffdfac68a50 1918->1923 1919->1917 1927 7ffdfac696b5-7ffdfac696bc 1919->1927 1940 7ffdfac69996-7ffdfac699bc 1922->1940 1923->1917 1938 7ffdfac69647-7ffdfac6965d memcmp 1923->1938 1930 7ffdfac696ef-7ffdfac696f3 1927->1930 1931 7ffdfac696be-7ffdfac696ea 1927->1931 1934 7ffdfac696f5-7ffdfac69721 1930->1934 1935 7ffdfac69726-7ffdfac69747 call 7ffdfac68a50 1930->1935 1931->1940 1934->1940 1935->1917 1943 7ffdfac6974d-7ffdfac6978d call 7ffdfac68a50 1935->1943 1938->1919 1938->1922 1940->1917 1943->1917 1948 7ffdfac69793-7ffdfac697b4 1943->1948 1949 7ffdfac6996a-7ffdfac6998f 1948->1949 1950 7ffdfac697ba-7ffdfac697bc 1948->1950 1949->1940 1950->1949 1951 7ffdfac697c2-7ffdfac697c8 1950->1951 1951->1949 1953 7ffdfac697ce-7ffdfac697d4 1951->1953 1953->1949 1954 7ffdfac697da-7ffdfac69801 call 7ffdfac68a50 1953->1954 1954->1917 1958 7ffdfac69807-7ffdfac69828 call 7ffdfac68a50 1954->1958 1958->1917 1961 7ffdfac6982e-7ffdfac6983c call 7ffdfac692d0 1958->1961 1961->1917 1964 7ffdfac69842-7ffdfac69863 call 7ffdfac68a50 1961->1964 1964->1917 1967 7ffdfac69869-7ffdfac6986f 1964->1967 1968 7ffdfac69871-7ffdfac6989a 1967->1968 1969 7ffdfac6989f-7ffdfac698c0 call 7ffdfac68a50 1967->1969 1968->1940 1969->1917 1973 7ffdfac698c6-7ffdfac698cc 1969->1973 1975 7ffdfac698ce-7ffdfac698f7 1973->1975 1976 7ffdfac698fc-7ffdfac6991d call 7ffdfac68a50 1973->1976 1975->1940 1976->1917 1980 7ffdfac69923-7ffdfac69929 1976->1980 1982 7ffdfac6992b-7ffdfac6992e 1980->1982 1983 7ffdfac69959-7ffdfac69968 call 7ffdfac68e30 1980->1983 1982->1983 1984 7ffdfac69930-7ffdfac69957 1982->1984 1983->1920 1984->1940
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: memcmp$memcpy
                                                                                                                                                                                            • String ID: BAD_COMPRESS$BAD_FILTER$BAD_IHDR$BAD_INTERLACE$DIMENSIONS$IMAGE$NO_IHDR$NO_SIG$PNG$RDHI$data stream does not have a PNG signature$expected IHDR chunk type$image dimensions are invalid or beyond architecture limits$invalid IHDR chunk size$unknown compression method %d$unknown filter method %d$unknown interlace method %d
                                                                                                                                                                                            • API String ID: 231171946-3873946725
                                                                                                                                                                                            • Opcode ID: f67ba8931cd3ee508cbb32ac56a5d2ddf9178ca313bcbf0ad479cbd4f5cc4ebe
                                                                                                                                                                                            • Instruction ID: 250cde69609ccd56ea9aa80a6101e089fb7f912e1857a9ebbdfc856557f559bb
                                                                                                                                                                                            • Opcode Fuzzy Hash: f67ba8931cd3ee508cbb32ac56a5d2ddf9178ca313bcbf0ad479cbd4f5cc4ebe
                                                                                                                                                                                            • Instruction Fuzzy Hash: 69C19D7AB08A5294EB58CB2199649BD33A1FB09B88F440572CE6D577ECEF3CD245C701

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            • Executed
                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                            control_flow_graph 2029 7ffdfac12140-7ffdfac12188 2030 7ffdfac1218e-7ffdfac1219c 2029->2030 2031 7ffdfac12687-7ffdfac126a6 2029->2031 2032 7ffdfac121a2-7ffdfac121c7 strcmp 2030->2032 2033 7ffdfac122bc-7ffdfac122bf 2030->2033 2041 7ffdfac12228-7ffdfac1222b 2032->2041 2042 7ffdfac121c9-7ffdfac12226 2032->2042 2034 7ffdfac12230-7ffdfac12253 2033->2034 2035 7ffdfac122c5-7ffdfac122c9 2033->2035 2046 7ffdfac12259-7ffdfac12260 2034->2046 2047 7ffdfac122fc-7ffdfac12311 call 7ffdfac0e220 2034->2047 2037 7ffdfac122f8-7ffdfac122fa 2035->2037 2038 7ffdfac122cb-7ffdfac122ef call 7ffdfac219c0 2035->2038 2040 7ffdfac12294-7ffdfac122bb call 7ffdfacef7a0 2037->2040 2038->2037 2041->2034 2042->2040 2052 7ffdfac1226e-7ffdfac12281 call 7ffdfac0db90 2046->2052 2053 7ffdfac12262-7ffdfac1226a call 7ffdfac21c00 2046->2053 2059 7ffdfac12317-7ffdfac12341 2047->2059 2060 7ffdfac124da-7ffdfac12502 call 7ffdfac0db90 2047->2060 2063 7ffdfac12611-7ffdfac12613 2052->2063 2064 7ffdfac12287 2052->2064 2053->2052 2073 7ffdfac12517-7ffdfac12538 call 7ffdfac214c0 2059->2073 2074 7ffdfac12347-7ffdfac123ad SHGetFileInfoW 2059->2074 2070 7ffdfac12507-7ffdfac12509 2060->2070 2066 7ffdfac1228c 2064->2066 2066->2040 2070->2063 2072 7ffdfac1250f-7ffdfac12512 call 7ffdfac0e100 2070->2072 2072->2073 2073->2064 2081 7ffdfac1253e-7ffdfac12544 2073->2081 2084 7ffdfac124c3-7ffdfac124d8 2074->2084 2085 7ffdfac123b3-7ffdfac1240e SHGetFileInfoW 2074->2085 2081->2064 2082 7ffdfac1254a-7ffdfac12575 2081->2082 2087 7ffdfac12585-7ffdfac1258c 2082->2087 2088 7ffdfac12577-7ffdfac1257a 2082->2088 2084->2060 2084->2073 2095 7ffdfac12410-7ffdfac12413 2085->2095 2096 7ffdfac12448-7ffdfac12486 memset 2085->2096 2092 7ffdfac1258e-7ffdfac125a1 2087->2092 2093 7ffdfac125a3-7ffdfac125b4 2087->2093 2088->2087 2091 7ffdfac1257c-7ffdfac12583 2088->2091 2091->2087 2091->2088 2092->2093 2101 7ffdfac125b6-7ffdfac125ef CreateIconIndirect 2092->2101 2093->2092 2099 7ffdfac12423-7ffdfac12443 DestroyIcon 2095->2099 2100 7ffdfac12415-7ffdfac1241d DestroyIcon 2095->2100 2096->2084 2102 7ffdfac12488-7ffdfac124c1 2096->2102 2099->2073 2100->2099 2101->2063 2103 7ffdfac125f1-7ffdfac12606 2101->2103 2102->2060 2107 7ffdfac12618-7ffdfac12676 call 7ffdfac0db90 2103->2107 2108 7ffdfac12608-7ffdfac1260b DestroyIcon 2103->2108 2107->2063 2112 7ffdfac12678-7ffdfac12682 call 7ffdfac0e100 2107->2112 2108->2063 2112->2066
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Icon$Destroy$FileInfo$CreateIndirectmemsetstrcmp
                                                                                                                                                                                            • String ID: -default$H$ICONBITMAP$OPTION$Tk_SizeOfBitmap received unknown bitmap argument$illegal option "%s" must be "-default"$window ?-default? ?image?
                                                                                                                                                                                            • API String ID: 1970194709-3871694194
                                                                                                                                                                                            • Opcode ID: d4e7a1b5e1d081a1c90487fabab4b637c41dd435efa97fd269368cb93b1798a0
                                                                                                                                                                                            • Instruction ID: 65cff87308ea88eebcde414603a39580554f8a39cc8cc5e3695a2d798f4ed3e3
                                                                                                                                                                                            • Opcode Fuzzy Hash: d4e7a1b5e1d081a1c90487fabab4b637c41dd435efa97fd269368cb93b1798a0
                                                                                                                                                                                            • Instruction Fuzzy Hash: 69E14A7A708B8696EB588F12E8647AD73A1FB88B84F084475CE6D47798EF7CE454C700

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            • Executed
                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                            control_flow_graph 2115 7ffdfac0db90-7ffdfac0dbb4 2116 7ffdfac0dbc2-7ffdfac0dbce 2115->2116 2117 7ffdfac0dbb6-7ffdfac0dbbe call 7ffdfacc6d90 2115->2117 2119 7ffdfac0dbd0-7ffdfac0dc2d 2116->2119 2120 7ffdfac0dc32-7ffdfac0dc3b 2116->2120 2117->2116 2159 7ffdfac0df60-7ffdfac0df78 2119->2159 2122 7ffdfac0dc3d-7ffdfac0dc40 call 7ffdfacc6110 2120->2122 2123 7ffdfac0dc45-7ffdfac0dc54 2120->2123 2122->2123 2126 7ffdfac0ddcd-7ffdfac0ddd3 2123->2126 2127 7ffdfac0dc5a-7ffdfac0dc5d 2123->2127 2128 7ffdfac0ddd5-7ffdfac0ddd7 call 7ffdfac0d9b0 2126->2128 2129 7ffdfac0dddc-7ffdfac0dddf 2126->2129 2130 7ffdfac0dc5f-7ffdfac0dc63 2127->2130 2131 7ffdfac0dc67-7ffdfac0dc6d 2127->2131 2128->2129 2136 7ffdfac0de60-7ffdfac0de63 2129->2136 2137 7ffdfac0dde1-7ffdfac0dde5 call 7ffdfac0ecf0 2129->2137 2130->2131 2132 7ffdfac0dc6f-7ffdfac0dc79 call 7ffdfac0d9b0 2131->2132 2133 7ffdfac0dcb0-7ffdfac0dcb3 2131->2133 2154 7ffdfac0dc7f-7ffdfac0dcab 2132->2154 2155 7ffdfac0df59 2132->2155 2141 7ffdfac0dcb5-7ffdfac0dcc5 SetClassLongPtrW 2133->2141 2142 7ffdfac0dcca-7ffdfac0dcd1 2133->2142 2139 7ffdfac0de7e-7ffdfac0de85 2136->2139 2140 7ffdfac0de65-7ffdfac0de79 SendMessageW 2136->2140 2152 7ffdfac0ddea-7ffdfac0ddf9 2137->2152 2146 7ffdfac0ded3 2139->2146 2147 7ffdfac0de87-7ffdfac0de8f 2139->2147 2145 7ffdfac0df2a-7ffdfac0df4a SendMessageW 2140->2145 2149 7ffdfac0dd79-7ffdfac0ddad SetClassLongPtrW 2141->2149 2150 7ffdfac0dd1f 2142->2150 2151 7ffdfac0dcd3-7ffdfac0dcdb 2142->2151 2160 7ffdfac0df51 2145->2160 2161 7ffdfac0df4c call 7ffdfac0e100 2145->2161 2153 7ffdfac0ded6-7ffdfac0deee SendMessageW 2146->2153 2157 7ffdfac0de91-7ffdfac0de94 2147->2157 2158 7ffdfac0deb7-7ffdfac0debb 2147->2158 2174 7ffdfac0ddaf call 7ffdfac0e100 2149->2174 2175 7ffdfac0ddb4-7ffdfac0ddb8 2149->2175 2156 7ffdfac0dd22-7ffdfac0dd37 SetClassLongPtrW 2150->2156 2162 7ffdfac0dcdd-7ffdfac0dce0 2151->2162 2163 7ffdfac0dd03-7ffdfac0dd07 2151->2163 2152->2136 2164 7ffdfac0ddfb-7ffdfac0de20 2152->2164 2153->2145 2166 7ffdfac0def0-7ffdfac0def8 2153->2166 2202 7ffdfac0de27-7ffdfac0de5b 2154->2202 2169 7ffdfac0df5b 2155->2169 2156->2149 2171 7ffdfac0dd39-7ffdfac0dd41 2156->2171 2172 7ffdfac0de98-7ffdfac0de9c 2157->2172 2158->2146 2173 7ffdfac0debd-7ffdfac0dec1 2158->2173 2160->2155 2161->2160 2168 7ffdfac0dce4-7ffdfac0dce8 2162->2168 2163->2150 2170 7ffdfac0dd09-7ffdfac0dd0d 2163->2170 2164->2202 2176 7ffdfac0df20-7ffdfac0df24 2166->2176 2177 7ffdfac0defa-7ffdfac0defd 2166->2177 2183 7ffdfac0dcf5-7ffdfac0dd01 2168->2183 2184 7ffdfac0dcea-7ffdfac0dced 2168->2184 2169->2159 2170->2156 2179 7ffdfac0dd6f-7ffdfac0dd73 2171->2179 2180 7ffdfac0dd43-7ffdfac0dd4a 2171->2180 2181 7ffdfac0de9e-7ffdfac0dea1 2172->2181 2182 7ffdfac0dea9-7ffdfac0deb5 2172->2182 2173->2153 2174->2175 2175->2155 2176->2145 2188 7ffdfac0df26 2176->2188 2187 7ffdfac0df01-7ffdfac0df05 2177->2187 2179->2149 2192 7ffdfac0dd75 2179->2192 2190 7ffdfac0dd50-7ffdfac0dd54 2180->2190 2181->2182 2191 7ffdfac0dea3-7ffdfac0dea7 2181->2191 2182->2158 2182->2172 2183->2163 2183->2168 2184->2183 2189 7ffdfac0dcef-7ffdfac0dcf3 2184->2189 2195 7ffdfac0df12-7ffdfac0df1e 2187->2195 2196 7ffdfac0df07-7ffdfac0df0a 2187->2196 2188->2145 2189->2183 2193 7ffdfac0dd0f-7ffdfac0dd1d 2189->2193 2198 7ffdfac0dd61-7ffdfac0dd6d 2190->2198 2199 7ffdfac0dd56-7ffdfac0dd59 2190->2199 2191->2182 2200 7ffdfac0dec3-7ffdfac0ded1 2191->2200 2192->2149 2193->2156 2195->2176 2195->2187 2196->2195 2201 7ffdfac0df0c-7ffdfac0df10 2196->2201 2198->2179 2198->2190 2199->2198 2203 7ffdfac0dd5b-7ffdfac0dd5f 2199->2203 2200->2153 2201->2195 2204 7ffdfac0df79-7ffdfac0df87 2201->2204 2202->2169 2203->2198 2205 7ffdfac0ddbd-7ffdfac0ddcb 2203->2205 2204->2145 2205->2149
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Class$LongMessageSend$HandleLoadModule$CursorIconRegister
                                                                                                                                                                                            • String ID: Can't set icon; window has no wrapper.$FAILED$ICON$LOOKUP$TOPLEVEL$Unable to set icon$WRAPPER$window "%s" isn't a top-level window
                                                                                                                                                                                            • API String ID: 3636279047-342970489
                                                                                                                                                                                            • Opcode ID: 66011fdf54bab27317aa1563bd1caeb3a00f1b6c29b3ab384650a012d114b1d4
                                                                                                                                                                                            • Instruction ID: 4aff91182850f23215c208c947e0ac76b2b038ede48035882574b8bff9ea06ec
                                                                                                                                                                                            • Opcode Fuzzy Hash: 66011fdf54bab27317aa1563bd1caeb3a00f1b6c29b3ab384650a012d114b1d4
                                                                                                                                                                                            • Instruction Fuzzy Hash: 38B16D29B086A681EB6D8B11E460ABD2364FB45B84F09D172DE2E877D9DF3CE541C700

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            • Executed
                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                            control_flow_graph 2488 7ffdfac0e220-7ffdfac0e25b 2490 7ffdfac0e25d-7ffdfac0e2ae 2488->2490 2491 7ffdfac0e2af-7ffdfac0e2d2 2488->2491 2494 7ffdfac0e2d4-7ffdfac0e2f4 2491->2494 2495 7ffdfac0e2f9-7ffdfac0e30c 2491->2495 2499 7ffdfac0e30d-7ffdfac0e33b call 7ffdfae2c2c0 2494->2499 2500 7ffdfac0e2f6 2494->2500 2505 7ffdfac0e341-7ffdfac0e34a 2499->2505 2506 7ffdfac0e7c3-7ffdfac0e81f 2499->2506 2500->2495 2505->2506 2507 7ffdfac0e350-7ffdfac0e36d 2505->2507 2507->2506 2511 7ffdfac0e373-7ffdfac0e37c 2507->2511 2511->2506 2512 7ffdfac0e382-7ffdfac0e39f 2511->2512 2512->2506 2516 7ffdfac0e3a5-7ffdfac0e40e 2512->2516 2520 7ffdfac0e414-7ffdfac0e4b4 2516->2520 2521 7ffdfac0e4b9-7ffdfac0e4c5 2516->2521 2539 7ffdfac0e6a8-7ffdfac0e6bb 2520->2539 2522 7ffdfac0e4e1-7ffdfac0e4ef 2521->2522 2523 7ffdfac0e4c7-7ffdfac0e4cb 2521->2523 2524 7ffdfac0e4f5-7ffdfac0e4fd 2522->2524 2525 7ffdfac0e679-7ffdfac0e698 2522->2525 2526 7ffdfac0e4d0-7ffdfac0e4df 2523->2526 2528 7ffdfac0e500-7ffdfac0e539 2524->2528 2535 7ffdfac0e69b-7ffdfac0e6a3 2525->2535 2526->2522 2526->2526 2537 7ffdfac0e53f-7ffdfac0e552 call 7ffdfae2c2c0 2528->2537 2538 7ffdfac0e739-7ffdfac0e742 2528->2538 2535->2539 2543 7ffdfac0e720-7ffdfac0e737 2537->2543 2544 7ffdfac0e558-7ffdfac0e55f 2537->2544 2545 7ffdfac0e749-7ffdfac0e75f 2538->2545 2543->2545 2547 7ffdfac0e565-7ffdfac0e597 2544->2547 2548 7ffdfac0e6bc-7ffdfac0e71e 2544->2548 2559 7ffdfac0e76c-7ffdfac0e780 2545->2559 2550 7ffdfac0e5c5-7ffdfac0e602 2547->2550 2551 7ffdfac0e599-7ffdfac0e5a1 2547->2551 2548->2559 2554 7ffdfac0e65e 2550->2554 2555 7ffdfac0e604-7ffdfac0e638 CreateIconFromResourceEx 2550->2555 2557 7ffdfac0e5c0 2551->2557 2558 7ffdfac0e5a3-7ffdfac0e5a6 2551->2558 2560 7ffdfac0e661-7ffdfac0e673 2554->2560 2555->2560 2561 7ffdfac0e63a-7ffdfac0e643 2555->2561 2557->2550 2562 7ffdfac0e5a8-7ffdfac0e5ab 2558->2562 2563 7ffdfac0e5b9-7ffdfac0e5be 2558->2563 2569 7ffdfac0e7a2-7ffdfac0e7be 2559->2569 2570 7ffdfac0e782 2559->2570 2560->2525 2560->2528 2561->2560 2565 7ffdfac0e645-7ffdfac0e65c CreateIconFromResource 2561->2565 2566 7ffdfac0e5ad-7ffdfac0e5b0 2562->2566 2567 7ffdfac0e5b2-7ffdfac0e5b7 2562->2567 2563->2550 2565->2560 2566->2550 2567->2550 2569->2535 2572 7ffdfac0e786-7ffdfac0e78c 2570->2572 2573 7ffdfac0e78e 2572->2573 2574 7ffdfac0e798-7ffdfac0e7a0 2572->2574 2573->2574 2574->2569 2574->2572
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID: -encoding$-translation$Error converting to internal format$FORMAT$ICON$Invalid file header$READ$binary$error opening file "%s" for reading: %s$error reading file: %s$error seeking in file: %s
                                                                                                                                                                                            • API String ID: 0-1482656021
                                                                                                                                                                                            • Opcode ID: 371e343402f841fe62214fdaeb89f45ebee375b445223cedba42b878f4efc454
                                                                                                                                                                                            • Instruction ID: 65c5706d522be334ea150c047f1d857b7c720c8ed56dc9f7551f0d12f0418547
                                                                                                                                                                                            • Opcode Fuzzy Hash: 371e343402f841fe62214fdaeb89f45ebee375b445223cedba42b878f4efc454
                                                                                                                                                                                            • Instruction Fuzzy Hash: 0FF1C17A704A6686EB588F15E86496D37A1FB84F80F098572CE2E873E8EF7DD154C700

                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                            • Executed
                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                            control_flow_graph 2579 7ffdfae90c00-7ffdfae90c03 2580 7ffdfae90cb7 2579->2580 2581 7ffdfae90c09-7ffdfae90c18 2579->2581 2582 7ffdfae90c1a-7ffdfae90c33 TlsAlloc 2581->2582 2583 7ffdfae90c3b 2581->2583 2584 7ffdfae90c39 2582->2584 2585 7ffdfae90d32-7ffdfae90d3e call 7ffdfae68bd0 2582->2585 2586 7ffdfae90c41-7ffdfae90c54 TlsGetValue 2583->2586 2584->2586 2591 7ffdfae90d3f-7ffdfae90d4b call 7ffdfae68bd0 2585->2591 2588 7ffdfae90c56-7ffdfae90c5e GetLastError 2586->2588 2589 7ffdfae90c64-7ffdfae90c67 2586->2589 2588->2589 2588->2591 2592 7ffdfae90c69 2589->2592 2593 7ffdfae90c71-7ffdfae90c7b 2589->2593 2594 7ffdfae90c69 call 7ffdfae908b0 2592->2594 2595 7ffdfae90d1a-7ffdfae90d31 call 7ffdfae68bd0 2593->2595 2596 7ffdfae90c81-7ffdfae90c84 2593->2596 2598 7ffdfae90c6e 2594->2598 2595->2585 2596->2595 2599 7ffdfae90c8a-7ffdfae90c91 2596->2599 2598->2593 2602 7ffdfae90cb8-7ffdfae90cd8 2599->2602 2603 7ffdfae90c93-7ffdfae90ca7 GetProcessHeap HeapFree 2599->2603 2606 7ffdfae90cda 2602->2606 2607 7ffdfae90cde-7ffdfae90cef 2602->2607 2605 7ffdfae90cad-7ffdfae90cb6 2603->2605 2605->2580 2606->2607 2607->2605 2608 7ffdfae90cf1-7ffdfae90d01 2607->2608 2608->2605 2609 7ffdfae90d03-7ffdfae90d15 2608->2609
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Heap$AllocErrorFreeLastProcessValue
                                                                                                                                                                                            • String ID: %lu %ld %ld %ld %ld %ld %ld$TlsGetValue failed from TclpGetAllocCache$alloc: could not allocate %d new objects$alloc: invalid block: %p: %x %x$could not allocate thread local storage$shared$thread%p
                                                                                                                                                                                            • API String ID: 3216287067-481911188
                                                                                                                                                                                            • Opcode ID: e2dc0e0fc3bad6eae0e4b7e834c524aff7cd0846022070a7e4669c82e16029ef
                                                                                                                                                                                            • Instruction ID: f2829740aab457ecea78f7e57bf391e2d98d5847355fcd295a25b78838952793
                                                                                                                                                                                            • Opcode Fuzzy Hash: e2dc0e0fc3bad6eae0e4b7e834c524aff7cd0846022070a7e4669c82e16029ef
                                                                                                                                                                                            • Instruction Fuzzy Hash: 6241B431B197428AEB589B29A46093833A0EF58BA8F5442B1D97F477DCDF3EE446C700
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: CharObjectSelectTextWidth$FaceMetricsRelease
                                                                                                                                                                                            • String ID: unicode$utf-16
                                                                                                                                                                                            • API String ID: 1149465119-3317161374
                                                                                                                                                                                            • Opcode ID: 961de23ea4c5f2ecaef7b85a45c49f30771c95694528759ce66e49853ab82aec
                                                                                                                                                                                            • Instruction ID: 32e0d3ac8d528335e68b34c183f8169dc95d93e2a815504b57f340afc120df29
                                                                                                                                                                                            • Opcode Fuzzy Hash: 961de23ea4c5f2ecaef7b85a45c49f30771c95694528759ce66e49853ab82aec
                                                                                                                                                                                            • Instruction Fuzzy Hash: AF716E76A08A8686DB25DF26E8606AD73A0FB48F94F044272DE6D47798EF3CD045C700
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: isspace$strncmp
                                                                                                                                                                                            • String ID: $%d %d %d$P5 $P6
                                                                                                                                                                                            • API String ID: 1236840406-2664775524
                                                                                                                                                                                            • Opcode ID: a0712c12df26fb808aa16000c534c96411ad5d49f437b339c8d35666c538745c
                                                                                                                                                                                            • Instruction ID: 1ba641709dec05bf9d8d72ccb45b5ff00cfd8fb687410f545488cc30b8b31579
                                                                                                                                                                                            • Opcode Fuzzy Hash: a0712c12df26fb808aa16000c534c96411ad5d49f437b339c8d35666c538745c
                                                                                                                                                                                            • Instruction Fuzzy Hash: 1351E319B1899282FB5A8B12E860F7D67A0FF95B85F0410B1ED6E833DCDF6CD5448740
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • _strnicmp.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000000,00000000,00007FFDFAC70BFE,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFDFAC7151D
                                                                                                                                                                                            • _strnicmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FFDFAC715BD
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _strnicmp
                                                                                                                                                                                            • String ID: -file option isn't supported for %s images$IMAGE$LOOKUP$NOT_FILE_FORMAT$PHOTO$PHOTO_FORMAT$UNRECOGNIZED_DATA$couldn't recognize data in image file "%s"$image file format "%s" is not supported
                                                                                                                                                                                            • API String ID: 2635805826-3773480712
                                                                                                                                                                                            • Opcode ID: 20ae4841c29cbdeeca31beb8bb2bc87302cf33153e9fb5e3893192c08ca681e7
                                                                                                                                                                                            • Instruction ID: 59227684a336561fa76a15050168948d6facf3edd6b95fc5f4820e0729f83397
                                                                                                                                                                                            • Opcode Fuzzy Hash: 20ae4841c29cbdeeca31beb8bb2bc87302cf33153e9fb5e3893192c08ca681e7
                                                                                                                                                                                            • Instruction Fuzzy Hash: F1A15E3A708A4681EB688F11E864BAE73A0FB49F94F484171CE6D477A8EF7CD159C740
                                                                                                                                                                                            APIs
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90AC1
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90AEF
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90AFD
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90B3B
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90B49
                                                                                                                                                                                            • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAD96A4A
                                                                                                                                                                                            • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAD96A53
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: AllocHeap$ErrorLastProcessValue__acrt_iob_funcfflush
                                                                                                                                                                                            • String ID: unable to alloc %u bytes$unable to alloc %u bytes, %s line %d
                                                                                                                                                                                            • API String ID: 4134382769-1299489142
                                                                                                                                                                                            • Opcode ID: 49816d9e0d97d5c8118677820650637b9eafaf1a894f68b1ecef00741ef075a8
                                                                                                                                                                                            • Instruction ID: 8cf3aaab4a2436230865eb502014221574e8e439fc89050eb9379d70d2411430
                                                                                                                                                                                            • Opcode Fuzzy Hash: 49816d9e0d97d5c8118677820650637b9eafaf1a894f68b1ecef00741ef075a8
                                                                                                                                                                                            • Instruction Fuzzy Hash: A941DE31F1C74282F75CAB25A460A792290EF5C798F5441B4DA6F07BDDEE3EE4428740
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: ExtentObjectPoint32SelectText
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1470722260-3916222277
                                                                                                                                                                                            • Opcode ID: 2f6770917ee5ad3147bc66cf75aec598b024298b8df05760692306a29310c3e7
                                                                                                                                                                                            • Instruction ID: 16e9353288fc56e954411fceaa7c82085b3e6f8295adf08ffbaab1d9944ffa56
                                                                                                                                                                                            • Opcode Fuzzy Hash: 2f6770917ee5ad3147bc66cf75aec598b024298b8df05760692306a29310c3e7
                                                                                                                                                                                            • Instruction Fuzzy Hash: A3D19F7AB08B6686EB148F65E850AAE7BB1F744B88F044031DF5E57BA8DF78D445CB00
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: CompositionContextProcStringWindow$CountMessageReleaseSendTick
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 4008441895-0
                                                                                                                                                                                            • Opcode ID: ff085adabb561743047a4ef4701becfe351342b6efb8f6f8758746e34f8ec804
                                                                                                                                                                                            • Instruction ID: 9e2baf32374db9cc5143b48823f7d29ad7d849e53877c9ec2ee31e661acd0b0c
                                                                                                                                                                                            • Opcode Fuzzy Hash: ff085adabb561743047a4ef4701becfe351342b6efb8f6f8758746e34f8ec804
                                                                                                                                                                                            • Instruction Fuzzy Hash: 28A1B03AF0878286E758DB6AD464ABD23B1FB48B84F544175DE2D837DEDE38E4518B00
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • memmove.VCRUNTIME140(?,?,?,?,00000000,?,00000000,?,?,?,?,?,00007FFDFAE82873,?,?,00000000), ref: 00007FFDFAE419E8
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: memmove
                                                                                                                                                                                            • String ID: LIST$UpdateStringProc for type '%s' failed to create a valid string rep$UpdateStringProc should not be invoked for type %s$concurrent dictionary modification and search$list$max size for a Tcl value (%d bytes) exceeded$unable to alloc %u bytes
                                                                                                                                                                                            • API String ID: 2162964266-1961554774
                                                                                                                                                                                            • Opcode ID: 4854c82d9cf011ccb7636a3be9eb0974481db71e80be03d6c323eb5cd9d24f09
                                                                                                                                                                                            • Instruction ID: 815de9b7be07250b4d2483fe9fb1bdb1c45fa08195dc01f2e077b89cc70ee715
                                                                                                                                                                                            • Opcode Fuzzy Hash: 4854c82d9cf011ccb7636a3be9eb0974481db71e80be03d6c323eb5cd9d24f09
                                                                                                                                                                                            • Instruction Fuzzy Hash: 0B02AE76B08B8686EF18AB15D460AA973A4FF84B84F148571CE6E07798DF3DE546C340
                                                                                                                                                                                            APIs
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE63A00: TlsAlloc.KERNEL32(?,?,?,?,00007FFDFAD93181), ref: 00007FFDFAE63A0D
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE63A00: TlsGetValue.KERNEL32(?,?,?,?,00007FFDFAD93181), ref: 00007FFDFAE63A3B
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE63A00: GetLastError.KERNEL32(?,?,?,?,00007FFDFAD93181), ref: 00007FFDFAE63A49
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE63A00: LeaveCriticalSection.KERNEL32(?,?,?,?,00007FFDFAD93181), ref: 00007FFDFAE63AEB
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE63A00: GetProcessHeap.KERNEL32(?,?,?,?,00007FFDFAD93181), ref: 00007FFDFAE63AFF
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE63A00: HeapAlloc.KERNEL32(?,?,?,?,00007FFDFAD93181), ref: 00007FFDFAE63B10
                                                                                                                                                                                            • memmove.VCRUNTIME140 ref: 00007FFDFADF3B84
                                                                                                                                                                                            • LeaveCriticalSection.KERNEL32 ref: 00007FFDFADF3C0C
                                                                                                                                                                                            • LeaveCriticalSection.KERNEL32 ref: 00007FFDFADF3E5C
                                                                                                                                                                                            • LeaveCriticalSection.KERNEL32 ref: 00007FFDFADF3E90
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: CriticalLeaveSection$AllocHeap$ErrorLastProcessValuememmove
                                                                                                                                                                                            • String ID: FreeEncoding: refcount problem !!!$concurrent dictionary modification and search$unable to alloc %u bytes
                                                                                                                                                                                            • API String ID: 700982036-687981174
                                                                                                                                                                                            • Opcode ID: a79ee89f19e736401fbacd389a02eb666b0f3bc42a0e06cfee0adbd6746313f1
                                                                                                                                                                                            • Instruction ID: c72c1f961dbc201f2b4d90a3a5476f942b5ef89f31a70c5ef0180f3bc39a93ff
                                                                                                                                                                                            • Opcode Fuzzy Hash: a79ee89f19e736401fbacd389a02eb666b0f3bc42a0e06cfee0adbd6746313f1
                                                                                                                                                                                            • Instruction Fuzzy Hash: EDD17F36B09A8285EB189F65D8A0AB933A4FF44B94F4541B5DE3E4B7D8EF3CE4518340
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: memcpy
                                                                                                                                                                                            • String ID: EARLY_END$EOF$IMAGE$PNG$channel read failed: %s$unexpected end of file$unexpected end of image data
                                                                                                                                                                                            • API String ID: 3510742995-1708351035
                                                                                                                                                                                            • Opcode ID: e900513a6ba54378526181cad5fe62014979accb64d4367502036b18d0465187
                                                                                                                                                                                            • Instruction ID: 3f1d149bc7ddadeb34db972310ba1fe53a1c814fa39d48e7017735f5973d2fbf
                                                                                                                                                                                            • Opcode Fuzzy Hash: e900513a6ba54378526181cad5fe62014979accb64d4367502036b18d0465187
                                                                                                                                                                                            • Instruction Fuzzy Hash: E7B1E26AB0CA5281EB28CF25E864BB937A1FB84B84F044172CE6D077D8DE7DE155C740
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: CriticalLeaveSection
                                                                                                                                                                                            • String ID: FreeEncoding: refcount problem !!!$PGV Initializer did not initialize$unable to alloc %u bytes
                                                                                                                                                                                            • API String ID: 3988221542-1397560407
                                                                                                                                                                                            • Opcode ID: f60fa58cd721ee0a0f936770aca0d5ff0ea5ec626b82e829b6088e72e321062e
                                                                                                                                                                                            • Instruction ID: ce187f8616a6098b6194b469f758eb8891fd450ebef94403d145699b668830a7
                                                                                                                                                                                            • Opcode Fuzzy Hash: f60fa58cd721ee0a0f936770aca0d5ff0ea5ec626b82e829b6088e72e321062e
                                                                                                                                                                                            • Instruction Fuzzy Hash: 8A814C22B09B4296EB18EB61D4A0AB92360FF48B84F044475DB6F47BDADF3DE451C340
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Window$ClientLongMovePlacementRectVisible
                                                                                                                                                                                            • String ID: ,
                                                                                                                                                                                            • API String ID: 2284278383-3772416878
                                                                                                                                                                                            • Opcode ID: 753c2e4485d44d42ee873d6fd2a1467b9a4acd050a22b9db533a10efc041b14e
                                                                                                                                                                                            • Instruction ID: 6d6ea2e60ae26038d5e88c74628242b64bfc16f4b6eaccbe549944b24e979623
                                                                                                                                                                                            • Opcode Fuzzy Hash: 753c2e4485d44d42ee873d6fd2a1467b9a4acd050a22b9db533a10efc041b14e
                                                                                                                                                                                            • Instruction Fuzzy Hash: 42A14A7AB046869BE768CF38C554B6C77A4FB48B54F004175DB2D873A8CF38E8608B40
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: ObjectSelect$FaceTextmemset
                                                                                                                                                                                            • String ID: unicode$utf-16
                                                                                                                                                                                            • API String ID: 920176757-3317161374
                                                                                                                                                                                            • Opcode ID: 0ef7dd9b9b51d631bdd2aeaee7c11b4b5063e5093dfbb883ad80748d58dbe8de
                                                                                                                                                                                            • Instruction ID: 176bd4c294f0b082882eeb923ca2f6ef96ee2cfd494cf44fa31da5c7fe79951e
                                                                                                                                                                                            • Opcode Fuzzy Hash: 0ef7dd9b9b51d631bdd2aeaee7c11b4b5063e5093dfbb883ad80748d58dbe8de
                                                                                                                                                                                            • Instruction Fuzzy Hash: 34517C7AB09B5691EB188B11E964BAA73B1FB48BD0F048175CE6D47798EF7CE160C300
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Window$CreateHandleLongModule
                                                                                                                                                                                            • String ID: BUTTON$STATIC
                                                                                                                                                                                            • API String ID: 4115577067-3385952364
                                                                                                                                                                                            • Opcode ID: 857e6716b15ef4890199d9618cffe4b0cb858dea5ec010925580daf5bbc2fd1a
                                                                                                                                                                                            • Instruction ID: a07fe7ae03dcaaa11b3dbc380ce4771b6fb64f53b3c42e3b930a110d0fc291cc
                                                                                                                                                                                            • Opcode Fuzzy Hash: 857e6716b15ef4890199d9618cffe4b0cb858dea5ec010925580daf5bbc2fd1a
                                                                                                                                                                                            • Instruction Fuzzy Hash: 50310A36608B82CBD754CF15E854A5AB7E4FB48B94F144136EF9D93B68DF38E5418B00
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: MessageSend
                                                                                                                                                                                            • String ID: WITHDRAW$can't withdraw %s: it is an icon for %s$can't withdraw %s: the container does not support the request$window
                                                                                                                                                                                            • API String ID: 3850602802-424501824
                                                                                                                                                                                            • Opcode ID: 79a46f53ba4360cf16e6e2b74b14b2f4ba767769c70bf59951814a704449ab67
                                                                                                                                                                                            • Instruction ID: 4db5b8df9f4ac340737f823c5f6644b8b4bcf6f00eca6fd6a5947811975868f1
                                                                                                                                                                                            • Opcode Fuzzy Hash: 79a46f53ba4360cf16e6e2b74b14b2f4ba767769c70bf59951814a704449ab67
                                                                                                                                                                                            • Instruction Fuzzy Hash: B5214436B09992D2E749DF21E864AAD2360FB48F59F594071CE2E8B2D8DF38D485C750
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: ObjectStock
                                                                                                                                                                                            • String ID: FONT$INTERNAL_PROBLEM$ansifixed$failed to allocate font due to internal system font engine problem
                                                                                                                                                                                            • API String ID: 3428563643-2695973982
                                                                                                                                                                                            • Opcode ID: 86f1ff635f697fcc766e6150e08cecf5b31e293b809dbadcf48e71ea96a5d93e
                                                                                                                                                                                            • Instruction ID: 83c2c00a5e8acc5534d1e02694800ba29ce7e71976028ae68e8cc3a73f7b90b0
                                                                                                                                                                                            • Opcode Fuzzy Hash: 86f1ff635f697fcc766e6150e08cecf5b31e293b809dbadcf48e71ea96a5d93e
                                                                                                                                                                                            • Instruction Fuzzy Hash: 4FD1B07A708B468ADB68CF16E960A6D77A5FB48B84F048175DE6E43798EF3CE050C700
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Window$ColorLongProc
                                                                                                                                                                                            • String ID: #%04X%04X%04X$Ttk
                                                                                                                                                                                            • API String ID: 3223664542-2938447076
                                                                                                                                                                                            • Opcode ID: 99c4d10d1e3fcec791e8b38746ad7f391361fda9ffe284d98070eef17f4e401c
                                                                                                                                                                                            • Instruction ID: 681b3a271f3cba0557c7935edc1e8709e365c8f8897e6c0f790f2e7c68e2afc2
                                                                                                                                                                                            • Opcode Fuzzy Hash: 99c4d10d1e3fcec791e8b38746ad7f391361fda9ffe284d98070eef17f4e401c
                                                                                                                                                                                            • Instruction Fuzzy Hash: ED41A03A708B9682E7548B15E860BAE73A1FB85B84F404076EEAD077D8DF3DE455CB40
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Valuememmove
                                                                                                                                                                                            • String ID: binary encoding is not available$iso8859-1$unable to alloc %u bytes
                                                                                                                                                                                            • API String ID: 3450688660-1438692910
                                                                                                                                                                                            • Opcode ID: 151df51cb31fa68ea7ad6d10dea10777b07ab6d2c6f2064ed8707a150b563f02
                                                                                                                                                                                            • Instruction ID: b883d444774b861534363745ce8ead875bb2519fcabc28b101d3cc9998dcc4e3
                                                                                                                                                                                            • Opcode Fuzzy Hash: 151df51cb31fa68ea7ad6d10dea10777b07ab6d2c6f2064ed8707a150b563f02
                                                                                                                                                                                            • Instruction Fuzzy Hash: 77E1AE32B08B81C6DB68DF15E454AAAB3E4FB88B94F158135DE9E83788DF39D454CB40
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • TlsGetValue.KERNEL32 ref: 00007FFDFAD7D554
                                                                                                                                                                                            • memset.VCRUNTIME140 ref: 00007FFDFAD7D5A0
                                                                                                                                                                                            • memset.VCRUNTIME140 ref: 00007FFDFAD7D71B
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90AC1
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90AEF
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90AFD
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90B3B
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90B49
                                                                                                                                                                                            • memmove.VCRUNTIME140 ref: 00007FFDFAD7D8E8
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: AllocHeapValuememset$ErrorLastProcessmemmove
                                                                                                                                                                                            • String ID: unable to alloc %u bytes
                                                                                                                                                                                            • API String ID: 3028997293-2759121943
                                                                                                                                                                                            • Opcode ID: b0dabbf8d090c816540934793651211dc09bdb36ab031de758adf1f00806ca24
                                                                                                                                                                                            • Instruction ID: 13d5ada9072b031658080c2ed3817071ae39b6938f16a60bd1776d60f049782f
                                                                                                                                                                                            • Opcode Fuzzy Hash: b0dabbf8d090c816540934793651211dc09bdb36ab031de758adf1f00806ca24
                                                                                                                                                                                            • Instruction Fuzzy Hash: C4C16162B09B4685EB6CDF15E860AB963A0FB84B94F444275DEAE077DCEF38D442C740
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: DeleteObject
                                                                                                                                                                                            • String ID: GC already registered in Tk_GetGC$called GCInit after GCCleanup$gray50
                                                                                                                                                                                            • API String ID: 1531683806-823200916
                                                                                                                                                                                            • Opcode ID: 719325626fab47a85f70baaa3eb835210efcf709a9d2012c85b3d6e5dea24c8d
                                                                                                                                                                                            • Instruction ID: 6b444ea020d4002832b5f13ff7a9de5a44ae24d18b30158fbfb07d6824a811ee
                                                                                                                                                                                            • Opcode Fuzzy Hash: 719325626fab47a85f70baaa3eb835210efcf709a9d2012c85b3d6e5dea24c8d
                                                                                                                                                                                            • Instruction Fuzzy Hash: 4BE153BAB04B918AEB14CF65E4907AC33A5FB48B88F058036DE5C5BB98DF38D495C740
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: DeleteObject
                                                                                                                                                                                            • String ID: unicode$utf-16
                                                                                                                                                                                            • API String ID: 1531683806-3317161374
                                                                                                                                                                                            • Opcode ID: c60797b1542d4fd6972a4b2a454828e70e554c962c1ccce3523fcd8e462a9309
                                                                                                                                                                                            • Instruction ID: 4cfc16681349caae0814bb8e496eb3788fac36d06cda900c315a2f7c2552737c
                                                                                                                                                                                            • Opcode Fuzzy Hash: c60797b1542d4fd6972a4b2a454828e70e554c962c1ccce3523fcd8e462a9309
                                                                                                                                                                                            • Instruction Fuzzy Hash: 38513C3AB05B5681EB488B16E86462D77B4FB48F80F0985B5CE2D477A8EF7DE560C300
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Window$CreateHandleModule
                                                                                                                                                                                            • String ID: TkChild
                                                                                                                                                                                            • API String ID: 1084761317-227893619
                                                                                                                                                                                            • Opcode ID: 7a62c55992fbcbf6ed3e4b251bfeaaffb2160c89fa5d2e0555a0a13e8e40b345
                                                                                                                                                                                            • Instruction ID: b530e840d1e269228d077f7e025311ac727b3ff48bb846aeae715dc7ea6cd47c
                                                                                                                                                                                            • Opcode Fuzzy Hash: 7a62c55992fbcbf6ed3e4b251bfeaaffb2160c89fa5d2e0555a0a13e8e40b345
                                                                                                                                                                                            • Instruction Fuzzy Hash: 5221EC76A08791CBE764CF25E450A1AB7E5FB48B94F189135EB9D83B68DF3CE5408B00
                                                                                                                                                                                            APIs
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90AC1
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90AEF
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90AFD
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90B3B
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90B49
                                                                                                                                                                                            • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00000000,?,00000000), ref: 00007FFDFAE4F51B
                                                                                                                                                                                            • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00000000,?,00000000), ref: 00007FFDFAE4F5F9
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Value$AllocHeap$ErrorLastProcess
                                                                                                                                                                                            • String ID: ::oo::Obj%d$unable to alloc %u bytes
                                                                                                                                                                                            • API String ID: 827889809-2182450095
                                                                                                                                                                                            • Opcode ID: d6a1075ee02968c8eb0af10b847805356a8640ceee84c109f14f8c592536a2ea
                                                                                                                                                                                            • Instruction ID: e3d8570fd544172e96e0056e70f470f1e03088b9bf97e0281d6fd2560b454fed
                                                                                                                                                                                            • Opcode Fuzzy Hash: d6a1075ee02968c8eb0af10b847805356a8640ceee84c109f14f8c592536a2ea
                                                                                                                                                                                            • Instruction Fuzzy Hash: 9FE18936B05B4286EB48AF15E460BA933A4FB88F84F088175DE2E477A9DF3DE551C350
                                                                                                                                                                                            APIs
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90AC1
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90AEF
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90AFD
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90B3B
                                                                                                                                                                                              • Part of subcall function 00007FFDFAE908B0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFDFAE800D6,?,?,00000000,00007FFDFAE823CD), ref: 00007FFDFAE90B49
                                                                                                                                                                                            • memmove.VCRUNTIME140(?,?,00000000,00007FFDFAE421A4,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFDFAE42415
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: AllocHeap$ErrorLastProcessValuememmove
                                                                                                                                                                                            • String ID: max size of Tcl literal array (%d literals) exceeded$unable to alloc %u bytes$unable to realloc %u bytes
                                                                                                                                                                                            • API String ID: 3772460680-186258196
                                                                                                                                                                                            • Opcode ID: 542798de78428611065f27c3d857c1ff925132b02d99e5aede26909b6141b578
                                                                                                                                                                                            • Instruction ID: 0f0ef1baa3bdf696c6ccb2361a540257a602f3de7b1db9e759129b51506a39b3
                                                                                                                                                                                            • Opcode Fuzzy Hash: 542798de78428611065f27c3d857c1ff925132b02d99e5aede26909b6141b578
                                                                                                                                                                                            • Instruction Fuzzy Hash: 9A31B53AF0574386EB58AF1594216B922A5EF80BA4F180675DE3E077DDDF3FE9028200
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: CommConsoleErrorFileLastModeStateType
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 3984557487-0
                                                                                                                                                                                            • Opcode ID: df3899ba5c7bcf4194486d8c598b4dcc5bcbbffe54da283f66fc9673edaa1001
                                                                                                                                                                                            • Instruction ID: c48366e198e23575af046857b437ed112893525942d65fb5edd0decdd2da93be
                                                                                                                                                                                            • Opcode Fuzzy Hash: df3899ba5c7bcf4194486d8c598b4dcc5bcbbffe54da283f66fc9673edaa1001
                                                                                                                                                                                            • Instruction Fuzzy Hash: FD01752070C70181F718AB25A87473A63A5EF88BD4F450174DA6F866D9DF2DD549CA00
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _errno
                                                                                                                                                                                            • String ID: ctory$unable to alloc %u bytes
                                                                                                                                                                                            • API String ID: 2918714741-474272330
                                                                                                                                                                                            • Opcode ID: 8ee575fe3066e290aa09768571b5cbcb8672d573531998a2046735e618959898
                                                                                                                                                                                            • Instruction ID: 95356aa4987f9ecc5d2531e7ea0faaa108a81175d2401a4fe5399c1f549e1176
                                                                                                                                                                                            • Opcode Fuzzy Hash: 8ee575fe3066e290aa09768571b5cbcb8672d573531998a2046735e618959898
                                                                                                                                                                                            • Instruction Fuzzy Hash: 83A10322B08B4286EB18AF25D470AB96BA0FF54B84F4441B5DE6E477D9DF3EE4858700
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: CreateDeleteIndirectObjectRectstrncmp
                                                                                                                                                                                            • String ID: tried to delete photo image when instances still exist
                                                                                                                                                                                            • API String ID: 3169462253-2722655475
                                                                                                                                                                                            • Opcode ID: 3b73d777d39f39ede53361599a6c2ef680884c6c6a9d3983f23c5625f1f00c17
                                                                                                                                                                                            • Instruction ID: f5c5784da512dd72b29205e976d28edf54938039ad5754f73e1494349e0a5760
                                                                                                                                                                                            • Opcode Fuzzy Hash: 3b73d777d39f39ede53361599a6c2ef680884c6c6a9d3983f23c5625f1f00c17
                                                                                                                                                                                            • Instruction Fuzzy Hash: D8516D7AB19B4682EB15CB11E864A7D33A9FB98B80F464671CE2D47798EF7DD190C300
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: strncmp
                                                                                                                                                                                            • String ID: ::tcl$::tcl::
                                                                                                                                                                                            • API String ID: 1114863663-1364682314
                                                                                                                                                                                            • Opcode ID: 0e4793d774c71894e080f3c98e40ccfbf545937e6b5365093b63d1accd7eacf9
                                                                                                                                                                                            • Instruction ID: 693d0275e7d6f997473d2235699ead7ce04f0cbcd81341d35d7b77b311f61516
                                                                                                                                                                                            • Opcode Fuzzy Hash: 0e4793d774c71894e080f3c98e40ccfbf545937e6b5365093b63d1accd7eacf9
                                                                                                                                                                                            • Instruction Fuzzy Hash: 07916E32B08B8186DB59CF25E890AAD77A0FB99B84F444076DE5D87B98EF3CD945C700
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: LongWindow
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1378638983-0
                                                                                                                                                                                            • Opcode ID: de7c3142df15802711a77df211f90b19db5808617cda21bf7a862613cbf31ce6
                                                                                                                                                                                            • Instruction ID: ad8215ceb9bbf3173515e6c44a6df0b632cb3a48c9a21f1d491d951b381329ed
                                                                                                                                                                                            • Opcode Fuzzy Hash: de7c3142df15802711a77df211f90b19db5808617cda21bf7a862613cbf31ce6
                                                                                                                                                                                            • Instruction Fuzzy Hash: 3E51AE3AB0868686E7188F51E860ABD77A5FB84B94F144075DE6D03BECDF7CE5548700
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Window$MessageSend
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1496643700-0
                                                                                                                                                                                            • Opcode ID: 1526359c49ad8ddcfc99a749032a253e6e3b61b0287d1bfee091b9dcd078323e
                                                                                                                                                                                            • Instruction ID: 13f117a0dd0c16799098bcd2cfb0e815a1dda687f6d5394c819b7e81dd2e2ac4
                                                                                                                                                                                            • Opcode Fuzzy Hash: 1526359c49ad8ddcfc99a749032a253e6e3b61b0287d1bfee091b9dcd078323e
                                                                                                                                                                                            • Instruction Fuzzy Hash: C3317E7670868196EB688F12D560BAEA7A0FB48BC4F0C0075EF5D07B99CF3CE5918740
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • GetSystemMetrics.USER32 ref: 00007FFDFAC2364A
                                                                                                                                                                                              • Part of subcall function 00007FFDFABF6890: __stdio_common_vsprintf.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FFDFABF68DB
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: MetricsSystem__stdio_common_vsprintf
                                                                                                                                                                                            • String ID: pathName ?-option value ...?
                                                                                                                                                                                            • API String ID: 2968932569-1831586811
                                                                                                                                                                                            • Opcode ID: 2c901f7006048d94f6e47743d0384f67a707a0a949fa757d2d1c7f3f4b5188e4
                                                                                                                                                                                            • Instruction ID: 67d72b9f04e9e790f6e8cef9b951df2f69313508af9199e045257df303b3b948
                                                                                                                                                                                            • Opcode Fuzzy Hash: 2c901f7006048d94f6e47743d0384f67a707a0a949fa757d2d1c7f3f4b5188e4
                                                                                                                                                                                            • Instruction Fuzzy Hash: 50A1237A604B8185D7449F21F950BAE33A8FB48F8CF484179DE990B398DF38D0A9E754
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • DestroyWindow.USER32(?,?,00000000,00007FFDFACC5C8A), ref: 00007FFDFAC0F8F1
                                                                                                                                                                                              • Part of subcall function 00007FFDFAC01470: GetFocus.USER32 ref: 00007FFDFAC0ED86
                                                                                                                                                                                              • Part of subcall function 00007FFDFAC01470: GetForegroundWindow.USER32 ref: 00007FFDFAC0ED99
                                                                                                                                                                                              • Part of subcall function 00007FFDFAC01470: IsWindow.USER32 ref: 00007FFDFAC0EDDD
                                                                                                                                                                                              • Part of subcall function 00007FFDFAC01470: SetWindowLongPtrW.USER32 ref: 00007FFDFAC0F155
                                                                                                                                                                                              • Part of subcall function 00007FFDFAC01470: SetWindowLongPtrW.USER32 ref: 00007FFDFAC0F176
                                                                                                                                                                                              • Part of subcall function 00007FFDFAC01470: SetParent.USER32 ref: 00007FFDFAC0F183
                                                                                                                                                                                              • Part of subcall function 00007FFDFAC01470: SendMessageW.USER32 ref: 00007FFDFAC0F19F
                                                                                                                                                                                              • Part of subcall function 00007FFDFAC01470: SendMessageW.USER32 ref: 00007FFDFAC0F1B8
                                                                                                                                                                                              • Part of subcall function 00007FFDFAC01470: GetDesktopWindow.USER32 ref: 00007FFDFAC0F1D0
                                                                                                                                                                                              • Part of subcall function 00007FFDFAC01470: SetWindowLongPtrW.USER32 ref: 00007FFDFAC0F1E9
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Window$Long$MessageSend$DesktopDestroyFocusForegroundParent
                                                                                                                                                                                            • String ID: numTransients should be 0
                                                                                                                                                                                            • API String ID: 1031645983-2970015814
                                                                                                                                                                                            • Opcode ID: ff6800b596d924796974a8a0fb14201910967cc4590ebb6610197190a1d944c9
                                                                                                                                                                                            • Instruction ID: 03eff80448461831d5eb22822cdbb00d02401d2c842458f06b21bebefc927671
                                                                                                                                                                                            • Opcode Fuzzy Hash: ff6800b596d924796974a8a0fb14201910967cc4590ebb6610197190a1d944c9
                                                                                                                                                                                            • Instruction Fuzzy Hash: B3711A3A709A9685EB589F25D460AAD37B0FF84F84F0885B5CE6D47798CF39E490C390
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID: name
                                                                                                                                                                                            • API String ID: 0-1579384326
                                                                                                                                                                                            • Opcode ID: 0ff29cf7af045aba3352e728221fb159f4cf0e13e58a0aeee67cd01ed567dbb8
                                                                                                                                                                                            • Instruction ID: cd97b188560dd4355afe047e61ffff0987cf46226602ec8199a57592e47fcbb1
                                                                                                                                                                                            • Opcode Fuzzy Hash: 0ff29cf7af045aba3352e728221fb159f4cf0e13e58a0aeee67cd01ed567dbb8
                                                                                                                                                                                            • Instruction Fuzzy Hash: 2D113A60F1864285E75CAB27AC61BBA21A0DF48BC4F845070DD2E477C9EE2DD4814340
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID: ButtonProc called on an invalid HWND
                                                                                                                                                                                            • API String ID: 0-237202145
                                                                                                                                                                                            • Opcode ID: 0be62edd70a93127788975da0d3d16b0fba35739c56e52aee4b2d0086fbc6ad7
                                                                                                                                                                                            • Instruction ID: feca19a258e27a3655603fc6052fcbdb048d685669701addb013a15482cde7eb
                                                                                                                                                                                            • Opcode Fuzzy Hash: 0be62edd70a93127788975da0d3d16b0fba35739c56e52aee4b2d0086fbc6ad7
                                                                                                                                                                                            • Instruction Fuzzy Hash: 6D112722B08A8586EB188B56EC60BB96360FF84FC4F884071DE6D477DDEE3CE5528300
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: memset
                                                                                                                                                                                            • String ID: T!
                                                                                                                                                                                            • API String ID: 2221118986-2999250500
                                                                                                                                                                                            • Opcode ID: 2ead9418fc30023de69f39f2c0cd7e1bf3a64e88dd7c12ca26c30418ccad3933
                                                                                                                                                                                            • Instruction ID: 12e8bf495b78092e51fa9dc487082fe4707bfb82d656c28bd73713f22bb7a578
                                                                                                                                                                                            • Opcode Fuzzy Hash: 2ead9418fc30023de69f39f2c0cd7e1bf3a64e88dd7c12ca26c30418ccad3933
                                                                                                                                                                                            • Instruction Fuzzy Hash: C4426A3AB08B8186EB59CF25E454AAD77A0FB88B88F144175DF9D53B98DF38E491C700
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID: Buffer Underflow, BUFFER_PADDING not enough
                                                                                                                                                                                            • API String ID: 0-3280121635
                                                                                                                                                                                            • Opcode ID: 8dd504d38ad0c54b9cea606a11ef04abcbdd2436c230b80057357f16f8e18235
                                                                                                                                                                                            • Instruction ID: 74e373cd412f916759203a35ba1c50d96ae5a79594c2907158a03d411b8897e4
                                                                                                                                                                                            • Opcode Fuzzy Hash: 8dd504d38ad0c54b9cea606a11ef04abcbdd2436c230b80057357f16f8e18235
                                                                                                                                                                                            • Instruction Fuzzy Hash: DA816A77B04A418AEB18DFA9D850AAD33F1FB44798F104135EE5EA7B98DB38E415CB40
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • memmove.VCRUNTIME140(00000000,00000000,00000000,00007FFDFAE8083A,?,?,00000000,00007FFDFADE0F76,?,?,?,?,?,00007FFDFADE3B51), ref: 00007FFDFAE80ACD
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929629858.00007FFDFAD71000.00000020.00000001.01000000.00000016.sdmp, Offset: 00007FFDFAD70000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929609826.00007FFDFAD70000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929721997.00007FFDFAEDC000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929755437.00007FFDFAF25000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929774223.00007FFDFAF28000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfad70000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: memmove
                                                                                                                                                                                            • String ID: max size for a Tcl value (%d bytes) exceeded
                                                                                                                                                                                            • API String ID: 2162964266-746697796
                                                                                                                                                                                            • Opcode ID: 3d54c99d1ee26e2d90630fa92c230f6e633da87b05812106973fc2f82085c46d
                                                                                                                                                                                            • Instruction ID: 42a2278cfd28c66fc0f1001aa27dea7496ab3a5ff9b7264d0ccfb920f4cb9f71
                                                                                                                                                                                            • Opcode Fuzzy Hash: 3d54c99d1ee26e2d90630fa92c230f6e633da87b05812106973fc2f82085c46d
                                                                                                                                                                                            • Instruction Fuzzy Hash: 6B21E132B1879182EB18EF159564A39B721FB40BE0F1482B1DE7E1B7C9DF7AE8018740
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: strchrstrncpy
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 3824778938-0
                                                                                                                                                                                            • Opcode ID: 3dd70e91cda7659e9fea90a2ba97e073655cc70a8f0590d3b4eb06a0e165f3c5
                                                                                                                                                                                            • Instruction ID: c9239dd806cbd8ecbc0e09b44e40cb5f9c96ce88ae6923629f3a28021ff84b91
                                                                                                                                                                                            • Opcode Fuzzy Hash: 3dd70e91cda7659e9fea90a2ba97e073655cc70a8f0590d3b4eb06a0e165f3c5
                                                                                                                                                                                            • Instruction Fuzzy Hash: F081803AB05A8686EB58CF19D460A7D77A1FF84B84B448472DF2E4B799DF38E851C700
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: memcmpmemset
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1065087418-0
                                                                                                                                                                                            • Opcode ID: 7d6aa1a5013d3299e1a2fab7c665f2a1efa3f327fbf0dafb701c2d0d7de9bd04
                                                                                                                                                                                            • Instruction ID: 2d584062cdd251c7e2254ad8e501ea3ed297e7f2f7e49451b58dc986dcbbaa4c
                                                                                                                                                                                            • Opcode Fuzzy Hash: 7d6aa1a5013d3299e1a2fab7c665f2a1efa3f327fbf0dafb701c2d0d7de9bd04
                                                                                                                                                                                            • Instruction Fuzzy Hash: 0F41817A719A8686EB24CF15E460A7E73A0FB88B84F004171DE5D47B88EF7DD541CB00
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: isspace
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 3785662208-0
                                                                                                                                                                                            • Opcode ID: db2a611a9eec198174cc12ffe5e507d9242c77662460e89183de332370ea0ac0
                                                                                                                                                                                            • Instruction ID: eab725d977a795d6566d21c1d6e734da4c453d3f61d3819755edfe1a175e84c9
                                                                                                                                                                                            • Opcode Fuzzy Hash: db2a611a9eec198174cc12ffe5e507d9242c77662460e89183de332370ea0ac0
                                                                                                                                                                                            • Instruction Fuzzy Hash: 2422007AB146858BDB54CF19E450A6EBBA5FB88B84F504136EB5E83798DF7CE401CB00
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                            • Opcode ID: 15fc42ba77be7717017beafaefcb60464f73cd1d5d7ba35e203dc8fa0f86ee9b
                                                                                                                                                                                            • Instruction ID: 486dd3030bea555d5b499bf7fdeb24d3b561952d619443b0e0e341e336c527e1
                                                                                                                                                                                            • Opcode Fuzzy Hash: 15fc42ba77be7717017beafaefcb60464f73cd1d5d7ba35e203dc8fa0f86ee9b
                                                                                                                                                                                            • Instruction Fuzzy Hash: 61A12A36B18A818AD76A8F35D021FAD77A0FF58B88F058331DA696369DDF39E451C700
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                            • Opcode ID: 61d512a20f0eaa039d9f55784af0f77745c0582269af3cc88e3964beb9da6d28
                                                                                                                                                                                            • Instruction ID: 6a18af7846cb1168c1d46e8d7964f406312f8bf2d489fcbb925c50c0bc123435
                                                                                                                                                                                            • Opcode Fuzzy Hash: 61d512a20f0eaa039d9f55784af0f77745c0582269af3cc88e3964beb9da6d28
                                                                                                                                                                                            • Instruction Fuzzy Hash: F2418276B0578281EB6A8F55D560BBC67A0EB84F84F0A607ADE6D473D9DF38D440C740
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: ShowWindow
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1268545403-0
                                                                                                                                                                                            • Opcode ID: a816552e71fadee9afb63e3e519801a83d88db330619432cb018bf26502ad68b
                                                                                                                                                                                            • Instruction ID: 9091925d3fb120c215dbce7a5b56ff27a143c438c56c641bf392096cb138b39f
                                                                                                                                                                                            • Opcode Fuzzy Hash: a816552e71fadee9afb63e3e519801a83d88db330619432cb018bf26502ad68b
                                                                                                                                                                                            • Instruction Fuzzy Hash: 88311C7670868186EB69CF19E05476EB7B0FB88B48F084175DB9D87799DB3CD4408B00
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: HandleLoadModule$ClassCursorIconRegisterShowWindow
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 3163394910-0
                                                                                                                                                                                            • Opcode ID: 98b884b54c0b8093845082c610b22f4043d8a90a50e94197627e4fd76053d9b5
                                                                                                                                                                                            • Instruction ID: 7f3a76663837354783e23fc714aa85fbc3b1a2e7ebaf712f7c60fce87a360c1c
                                                                                                                                                                                            • Opcode Fuzzy Hash: 98b884b54c0b8093845082c610b22f4043d8a90a50e94197627e4fd76053d9b5
                                                                                                                                                                                            • Instruction Fuzzy Hash: FD217136B0C69681EB588F15D2A4BBD27B0EB88B54F1C8075DA2DCB3C9DF68D9C18750
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • memcpy.VCRUNTIME140(?,?,?,?,00000008,00000000,000000D0,?,?,00007FFDFAC8BCC2), ref: 00007FFDFAC8CE5B
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: memcpy
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 3510742995-0
                                                                                                                                                                                            • Opcode ID: 1d0ea6f8b58e166b1403f1f5555346340e46a15ebde85784e01d1d1befdaf410
                                                                                                                                                                                            • Instruction ID: 8133a30a788d51d0c566fd9c92bb04539bca4a11b7c5fc55e4fa0d3ed3a4d972
                                                                                                                                                                                            • Opcode Fuzzy Hash: 1d0ea6f8b58e166b1403f1f5555346340e46a15ebde85784e01d1d1befdaf410
                                                                                                                                                                                            • Instruction Fuzzy Hash: BAF136BA606F45CACB64CF09E0905ADBBB4F788B84B55C12ACB5E43764DF38E595C700
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: CaptureDestroyWindow
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 853972342-0
                                                                                                                                                                                            • Opcode ID: b715ff6cc1f68a14805dc0e36209306f766bf9f7b2b72fa6f3fdf86713b68951
                                                                                                                                                                                            • Instruction ID: 3dacd9b43e16ebc3e3f017b0436ff3c6b5f92758dcacc6951a722cac89547764
                                                                                                                                                                                            • Opcode Fuzzy Hash: b715ff6cc1f68a14805dc0e36209306f766bf9f7b2b72fa6f3fdf86713b68951
                                                                                                                                                                                            • Instruction Fuzzy Hash: 33115126708B9286EB59CB12E85466E77B4FB88F84F084075DF5D47B98DF3CD5528700
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: memset
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 2221118986-0
                                                                                                                                                                                            • Opcode ID: e74d781beeba70443377cc54e8dc89fe99b30deb64ed9bc94750147b23a5e519
                                                                                                                                                                                            • Instruction ID: 2576256ea8799e10c7720fab5e9fb70e9133756ff38b572cb34c6d26f21adabc
                                                                                                                                                                                            • Opcode Fuzzy Hash: e74d781beeba70443377cc54e8dc89fe99b30deb64ed9bc94750147b23a5e519
                                                                                                                                                                                            • Instruction Fuzzy Hash: 66F1F075B0968796E7488B18ECA066433A5FF88760F544779E93DC72E4EF3CEA408B40
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: ShowWindow
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1268545403-0
                                                                                                                                                                                            • Opcode ID: 167ab18a3873ebc333d22b78057ba147a7493fcdf7d5c7a1b8b4cdc053a76a59
                                                                                                                                                                                            • Instruction ID: 24c287489d39bd90900f8c7e057c8e10ce88b2231ce0d2b8a662174c22fcff93
                                                                                                                                                                                            • Opcode Fuzzy Hash: 167ab18a3873ebc333d22b78057ba147a7493fcdf7d5c7a1b8b4cdc053a76a59
                                                                                                                                                                                            • Instruction Fuzzy Hash: 76113A72608B8186D728CF15E4917AEB3B0F788B94F144136EA9D87B99DF38D4958B00
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: ShowWindow
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1268545403-0
                                                                                                                                                                                            • Opcode ID: c0dd2bf71d95c61cf7ebb3dc171792536834da87f5e96c054f4d4db983d86b9c
                                                                                                                                                                                            • Instruction ID: 136d3f3c2716242372a2bef4c08fd94e9c1c74c208f08b0d5a880307ea1a7bd7
                                                                                                                                                                                            • Opcode Fuzzy Hash: c0dd2bf71d95c61cf7ebb3dc171792536834da87f5e96c054f4d4db983d86b9c
                                                                                                                                                                                            • Instruction Fuzzy Hash: E8F0687DF0C55282EB794A1584A477D1261DB94B15F2CC075C5188E3DCDE39DCC68660
                                                                                                                                                                                            APIs
                                                                                                                                                                                              • Part of subcall function 00007FFDFAC05200: _stricmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FFDFAC0522F
                                                                                                                                                                                              • Part of subcall function 00007FFDFAC05200: _stricmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FFDFAC05247
                                                                                                                                                                                              • Part of subcall function 00007FFDFAC05200: _stricmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FFDFAC0525B
                                                                                                                                                                                              • Part of subcall function 00007FFDFAC05200: EnumFontFamiliesW.GDI32 ref: 00007FFDFAC052A3
                                                                                                                                                                                            • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,00007FFDFAD18DD8,00007FFDFAC0477D), ref: 00007FFDFAC04FEB
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _stricmp$EnumFamiliesFontmemcpy
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1739947011-0
                                                                                                                                                                                            • Opcode ID: 2ac39c5200a5c4eacf4da3011bf3ef757841d8e6c51e8bf506121fe95362a045
                                                                                                                                                                                            • Instruction ID: 0fe7b11dc80895fc587f53b983f7055a107271fe020c958cdcd69fa57cd2aa7e
                                                                                                                                                                                            • Opcode Fuzzy Hash: 2ac39c5200a5c4eacf4da3011bf3ef757841d8e6c51e8bf506121fe95362a045
                                                                                                                                                                                            • Instruction Fuzzy Hash: 10519E36B08A9682DB14CB29D5607BD7371FB94B88F489232DE5E87799DF38D1848740
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Palette$Select$Realize$ColorsCompatibleCreateObjectUpdate$BitmapDeleteModeRelease
                                                                                                                                                                                            • String ID: $Only ZPixmap types are implemented$XGetImageZPixmap Failure
                                                                                                                                                                                            • API String ID: 4159931456-2551037732
                                                                                                                                                                                            • Opcode ID: 0ac885ab47b5886e1449134e1fcecd392a179afe801b61253fa416db15e941b4
                                                                                                                                                                                            • Instruction ID: 0872888e5974153d61aa7a7d3827dec565568107cfe8283352d28c0173317ecb
                                                                                                                                                                                            • Opcode Fuzzy Hash: 0ac885ab47b5886e1449134e1fcecd392a179afe801b61253fa416db15e941b4
                                                                                                                                                                                            • Instruction Fuzzy Hash: 9F22907A70879586D7688F16E454A2EB7B5FB88B80F049175DEAD43B98DF3CD054CB00
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: FileType$Handleabortwcsncmp
                                                                                                                                                                                            • String ID: -encoding$-file$8.1$8.6$Error in startup script$application-specific initialization failed$argc$argv$argv0$errorInfo$tcl_interactive
                                                                                                                                                                                            • API String ID: 3955523346-597551069
                                                                                                                                                                                            • Opcode ID: 3861969c55d8f12cc7fe77c21868ae00e929ec34106b352bce424be3a1e96f54
                                                                                                                                                                                            • Instruction ID: 972641d29feab4187aa3977ea6cb0ab0a1355b97a975f14c7dc6711a0345b7c7
                                                                                                                                                                                            • Opcode Fuzzy Hash: 3861969c55d8f12cc7fe77c21868ae00e929ec34106b352bce424be3a1e96f54
                                                                                                                                                                                            • Instruction Fuzzy Hash: 9A027179B09A9682EB589B15E864BBE2361FF44F90F4441B1DE2E073D8EF7DE5548300
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: FromPointWindowmemset
                                                                                                                                                                                            • String ID: &$CLIPBOARD
                                                                                                                                                                                            • API String ID: 908244748-1846057221
                                                                                                                                                                                            • Opcode ID: b668ecc01d60f5f8700b0802cc6cca1a570df7f68f0ac8916e53f01a2f8fc642
                                                                                                                                                                                            • Instruction ID: d1447c0b604abc02ac6ba3e639d5bf64cb0887b913958e082fd6955793f4bcb7
                                                                                                                                                                                            • Opcode Fuzzy Hash: b668ecc01d60f5f8700b0802cc6cca1a570df7f68f0ac8916e53f01a2f8fc642
                                                                                                                                                                                            • Instruction Fuzzy Hash: 65F1E076B086818BE7588F39D464A7D7BA1FB84758F144179EA6A47ADCCF3CE440CB40
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Window$EnableItemmemset$MessageSendText
                                                                                                                                                                                            • String ID: #$TkFontchooserFontChanged$TkFontchooserVisibility
                                                                                                                                                                                            • API String ID: 1523678569-1243688034
                                                                                                                                                                                            • Opcode ID: c7dfca098e899420b0701750d90c29a3afdde5202462388a05fffef126269ee7
                                                                                                                                                                                            • Instruction ID: 2a53802f3fed41802eb708cc65cedacb3bd3587ff9ec20802a6f80433cf8e051
                                                                                                                                                                                            • Opcode Fuzzy Hash: c7dfca098e899420b0701750d90c29a3afdde5202462388a05fffef126269ee7
                                                                                                                                                                                            • Instruction Fuzzy Hash: D7916036B18B8285EB18CF66E860A7973A1FB88B88F544176EA5D437ACDF3CD541C740
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: State
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1649606143-0
                                                                                                                                                                                            • Opcode ID: 98f52b6337070ba2003eff1c74b65ff3ecd04ed43030bd47901021b998995126
                                                                                                                                                                                            • Instruction ID: af3b3838339ed879a6a4cc9e2db611d9eb89ec38a9d0baaf224442765705317c
                                                                                                                                                                                            • Opcode Fuzzy Hash: 98f52b6337070ba2003eff1c74b65ff3ecd04ed43030bd47901021b998995126
                                                                                                                                                                                            • Instruction Fuzzy Hash: 6721627BF1465767F70C2F5298D16686792FFE8B22F870538C71B532958F7E88424220
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: BitsClientRectRelease
                                                                                                                                                                                            • String ID: %02x$($XGetGeometry: invalid pixmap$XGetGeometry: invalid window$XGetGeometry: unable to get bitmap size
                                                                                                                                                                                            • API String ID: 3715867303-295437046
                                                                                                                                                                                            • Opcode ID: 176cf7e2f9dc3ae0aee286e4ddb65fa7b66b4390a416f1bd89dc0a294d3d62db
                                                                                                                                                                                            • Instruction ID: ab44ba6514956a6740ac9edaf48d7b833674132a0ce1ecdd0d10af55f257ade8
                                                                                                                                                                                            • Opcode Fuzzy Hash: 176cf7e2f9dc3ae0aee286e4ddb65fa7b66b4390a416f1bd89dc0a294d3d62db
                                                                                                                                                                                            • Instruction Fuzzy Hash: 7471F676B08A5686EB18CF15E864A6EB7B0FB88B94F404071DE6D47798DF7DE484CB00
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: floor
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 3192247854-0
                                                                                                                                                                                            • Opcode ID: bb0e099aa58a1973255c48e269649512c53434f08fac3af0c9061f5058f1b1ab
                                                                                                                                                                                            • Instruction ID: 3246e180f14ce8af29be52f9c9331373616fd530fadfba89a3e563f5d513ef2c
                                                                                                                                                                                            • Opcode Fuzzy Hash: bb0e099aa58a1973255c48e269649512c53434f08fac3af0c9061f5058f1b1ab
                                                                                                                                                                                            • Instruction Fuzzy Hash: B2D1B736E14F804ED3178B3590506ADF3A9EF5A7C4F158322FE4A73A59DB38A4928B10
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: CapsDevicememcpy
                                                                                                                                                                                            • String ID: (background event handler)$bold$italic$overstrike$underline
                                                                                                                                                                                            • API String ID: 58821350-4131028843
                                                                                                                                                                                            • Opcode ID: c8a7e48adcd6137f1a0197d93e314e4a107b2c22813df231dcd3e3cdbe1f5165
                                                                                                                                                                                            • Instruction ID: e23aa80f5575875ab10723ba973c886b244f35761b3b7f8f641fae51773aeb00
                                                                                                                                                                                            • Opcode Fuzzy Hash: c8a7e48adcd6137f1a0197d93e314e4a107b2c22813df231dcd3e3cdbe1f5165
                                                                                                                                                                                            • Instruction Fuzzy Hash: E1918475708A8A86EB088F16E8646BA7761FB88F94F454172CD3E473E8DEBDD155C300
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID: %d/%d/%d$GC already registered in Tk_GetGC$TkImgPhotoGet couldn't find visual for window$black$called GCInit after GCCleanup$white
                                                                                                                                                                                            • API String ID: 0-3264705210
                                                                                                                                                                                            • Opcode ID: deed93d1c8d9424dbe04e342c9d802a87d84831df395c654f8fc0a17369a3caf
                                                                                                                                                                                            • Instruction ID: 0661f448f25275b40bd9e984a89e3a0d6cd42138e34abf808cfe95423abd56db
                                                                                                                                                                                            • Opcode Fuzzy Hash: deed93d1c8d9424dbe04e342c9d802a87d84831df395c654f8fc0a17369a3caf
                                                                                                                                                                                            • Instruction Fuzzy Hash: 3C1257BAB04B4686EB58CF25E494A6D77B4FB48B84F014166CF6D47798EF78E4A0C700
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Menu$AsyncState$ClientCountCursorFromItemMetricsPointPopupRemoveScreenSystemTrackWindow
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 2544695384-0
                                                                                                                                                                                            • Opcode ID: 2b1d08f2c3ea8af079228691d4a642af7da79c396882fa4667ecbe12fbd774bf
                                                                                                                                                                                            • Instruction ID: eab8beb5df1b76a751e39d056c658a6e9a84343a032c9ea613c9cb39f0cda366
                                                                                                                                                                                            • Opcode Fuzzy Hash: 2b1d08f2c3ea8af079228691d4a642af7da79c396882fa4667ecbe12fbd774bf
                                                                                                                                                                                            • Instruction Fuzzy Hash: 0E71853AB08A5686EB189F16E860A7D77B0FB84B94F044075DE6E87798DF3CD445CB00
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: CreateMessage$BitmapDeleteErrorFormatFreeLastLocalObjectReleaseSection
                                                                                                                                                                                            • String ID: GC already registered in Tk_GetGC$called GCInit after GCCleanup
                                                                                                                                                                                            • API String ID: 1892380217-2292843906
                                                                                                                                                                                            • Opcode ID: dafc7936b907e791eb55a20fb44bd85d0166e5c5caf8ffb169cdb8dc3622c697
                                                                                                                                                                                            • Instruction ID: 17d8c612aaae40bae5f23c210734f3a4cc53e324bce7a6880ec173acf17bf981
                                                                                                                                                                                            • Opcode Fuzzy Hash: dafc7936b907e791eb55a20fb44bd85d0166e5c5caf8ffb169cdb8dc3622c697
                                                                                                                                                                                            • Instruction Fuzzy Hash: 0BF16D7AA04B818AD758CF25E494AAE77B4F788B88F01813ADF5D87758DF38E550CB40
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Create$Brush$CompatibleFillObjectRectSelectSolid$BitmapPattern
                                                                                                                                                                                            • String ID: unexpected drawable type in stipple
                                                                                                                                                                                            • API String ID: 2830929341-1374382833
                                                                                                                                                                                            • Opcode ID: 12e2141d4a1dbf3ad1c881a41839ada16ea606d3ccb3c6b79ca73fa49b9ec48f
                                                                                                                                                                                            • Instruction ID: 723f7c26699beb0a0fea34ef58ffab9cc0485a68b67351417135c4d45560215c
                                                                                                                                                                                            • Opcode Fuzzy Hash: 12e2141d4a1dbf3ad1c881a41839ada16ea606d3ccb3c6b79ca73fa49b9ec48f
                                                                                                                                                                                            • Instruction Fuzzy Hash: 6BB14E36B08AD186DB288F62E86467EB7A1FB49F85F048175DE5A47B98DF3CD044CB10
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Object$Select$Create$Brush$Delete$Solid$CompatibleFillModePoly$BitmapPattern
                                                                                                                                                                                            • String ID: $unexpected drawable type in stipple
                                                                                                                                                                                            • API String ID: 900603657-2568577462
                                                                                                                                                                                            • Opcode ID: b9a326633d7db234b64f16dcc6a74334026790d4e74d356c9acfbbddf293a1da
                                                                                                                                                                                            • Instruction ID: 6ab6bc8b9aaedc8dc2cbe749abf53144022126d176b5b55ad6a9b04c19b9a1bf
                                                                                                                                                                                            • Opcode Fuzzy Hash: b9a326633d7db234b64f16dcc6a74334026790d4e74d356c9acfbbddf293a1da
                                                                                                                                                                                            • Instruction Fuzzy Hash: E4911C3A7187C186DB289F62E814A6EB7A0FB89FC5F044175DE5A53BA8CF3DD4458B00
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID: %s transparency get: coordinates out of range$%s transparency set: coordinates out of range$COORDINATES$PHOTO_FORMAT$can't write image to a file in a safe interpreter$coordinates for -from option extend outside image$fileName ?-option value ...?$image file format "%s" has no file writing capability$image file format "%s" is unknown$no available image file format has file writing capability$option ?arg ...?$unexpected fallthrough$x y$x y boolean
                                                                                                                                                                                            • API String ID: 0-1379397464
                                                                                                                                                                                            • Opcode ID: f1d916eca2aa738b53eb62854c0febbee68b939f878f478458655a2ec205a34b
                                                                                                                                                                                            • Instruction ID: 50e06e000c88cceaac0351f5ee1bf124cda3dd63eeea140beed3dadfe811ef9f
                                                                                                                                                                                            • Opcode Fuzzy Hash: f1d916eca2aa738b53eb62854c0febbee68b939f878f478458655a2ec205a34b
                                                                                                                                                                                            • Instruction Fuzzy Hash: 88127F3AB08A5686EB18CB16D864ABD27A1FB49F94F0441B2CE2E477D8DF3CE545C350
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: System$Metrics$Object$CreateDeleteInfoParametersSelectText$CapsDeviceFaceFontIndirectStock
                                                                                                                                                                                            • String ID: DISPLAY$bold$italic
                                                                                                                                                                                            • API String ID: 1174697729-1468587400
                                                                                                                                                                                            • Opcode ID: 733a1bb112802c423b7eb3ed79650e05a048f58b7bb2b4a63faaa7da81a8f42a
                                                                                                                                                                                            • Instruction ID: 2293c6f87d1d5e9ef0be6ecafd717aac1edb6bf435e1d8827736bd59c4a1b1a3
                                                                                                                                                                                            • Opcode Fuzzy Hash: 733a1bb112802c423b7eb3ed79650e05a048f58b7bb2b4a63faaa7da81a8f42a
                                                                                                                                                                                            • Instruction Fuzzy Hash: 89815075B08A8782EB188F11F864AA93365FF84B84F444071DE6E436E8EF7CE609C740
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: isdigitstrncmp
                                                                                                                                                                                            • String ID: %s, $INAPPROPRIATE$LOOKUP$VALUE$VISUAL$VISUALID$WINDOW$bad X identifier for visual: "%s"$bad window path name "%s"$couldn't find an appropriate visual$default$or default$unknown or ambiguous visual name "%s": class must be
                                                                                                                                                                                            • API String ID: 3225286371-3323866090
                                                                                                                                                                                            • Opcode ID: b0e79370a99996a32c98bbddff8e4190997ee520ef38ca08996a4423ccc15618
                                                                                                                                                                                            • Instruction ID: 94abe58820c1e70d880bb9a84fa9edd8ded608c3ce5b1ff8de65d986f0d929ee
                                                                                                                                                                                            • Opcode Fuzzy Hash: b0e79370a99996a32c98bbddff8e4190997ee520ef38ca08996a4423ccc15618
                                                                                                                                                                                            • Instruction Fuzzy Hash: 5D129B7AB09B8686EB588F15E964ABD77A0FB84B84F0580B6DE6D47398DF3CD440C300
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: strncmp
                                                                                                                                                                                            • String ID: CANVAS$ITEM_INDEX$TEXT$UNSELECTED$bad index "%s"$end$insert$sel.first$sel.last$selection isn't in item
                                                                                                                                                                                            • API String ID: 1114863663-2046340879
                                                                                                                                                                                            • Opcode ID: f794f29af40e62cbdd899500c6a82fd3138b4f717da73dca186c3afddfd8439c
                                                                                                                                                                                            • Instruction ID: 7964d3f05fcc7cd1c7daf34779553b0834460183cd8f1f18ac47f98beb2751ec
                                                                                                                                                                                            • Opcode Fuzzy Hash: f794f29af40e62cbdd899500c6a82fd3138b4f717da73dca186c3afddfd8439c
                                                                                                                                                                                            • Instruction Fuzzy Hash: 20A19465B08B8795EB198B26E460BBD63B1FF45B84F008272DA5E57398EF3CD582C340
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: strncmp
                                                                                                                                                                                            • String ID: BAD_INDEX$ENTRY$NO_SELECTION$SPINBOX$anchor$bad %s index "%s"$end$entry$insert$sel.first$sel.last$selection isn't in widget %s$spinbox
                                                                                                                                                                                            • API String ID: 1114863663-3569778872
                                                                                                                                                                                            • Opcode ID: 17945c4db8b5f4300e3a5cc54bc01b0a21e4b6a1c74edd97234a44d7963245a4
                                                                                                                                                                                            • Instruction ID: 62bac1e859593912f8e46a141b0839d1381a5a7764c787bbb3913d4dd24f768b
                                                                                                                                                                                            • Opcode Fuzzy Hash: 17945c4db8b5f4300e3a5cc54bc01b0a21e4b6a1c74edd97234a44d7963245a4
                                                                                                                                                                                            • Instruction Fuzzy Hash: 5E719D39B0865796EB2C8F26E860ABD23E1FB44B84F454471CE2D87698EF3CE651C704
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID: BAD_DEPTH$IMAGE$PITCH$PNG$SIZE$UNKNOWN_COLOR$bit depth is not allowed for given color type$image pitch is out of supported range on this architecture$image total size is out of supported range on this architecture$unknown color type %d$unknown color type field %d
                                                                                                                                                                                            • API String ID: 0-2707434482
                                                                                                                                                                                            • Opcode ID: be8caf87876c4e5bd9242c14651de81d77f0ca356b7688618689046f61614030
                                                                                                                                                                                            • Instruction ID: a4c9edec017e14550276f4597afc1537fa8268bf667066c009a80b07e56ffe01
                                                                                                                                                                                            • Opcode Fuzzy Hash: be8caf87876c4e5bd9242c14651de81d77f0ca356b7688618689046f61614030
                                                                                                                                                                                            • Instruction Fuzzy Hash: 2981F179B0C56285EB5DCB399464BBC37A1EB45B48F4801BADA6E073ECEE2DD485C700
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • strchr.VCRUNTIME140(?,?,?,?,00000000,?,00000000,00007FFDFAC54488), ref: 00007FFDFAC57BC2
                                                                                                                                                                                            • isspace.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,00000000,?,00000000,00007FFDFAC54488), ref: 00007FFDFAC57BD1
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: isspacestrchr
                                                                                                                                                                                            • String ID: FONT$FONT_STYLE$LOOKUP$font "%s" doesn't exist$normal$overstrike$roman$underline$unknown font style "%s"
                                                                                                                                                                                            • API String ID: 2446454806-3998826473
                                                                                                                                                                                            • Opcode ID: 2c922afe8f19234197c38261dfecdb65bb56e7c30e1d089a20187d9484067c09
                                                                                                                                                                                            • Instruction ID: b90b9c2738c05e98599162e9dfb8482c7151f153dccb91898daae043cc99f16d
                                                                                                                                                                                            • Opcode Fuzzy Hash: 2c922afe8f19234197c38261dfecdb65bb56e7c30e1d089a20187d9484067c09
                                                                                                                                                                                            • Instruction Fuzzy Hash: 17029239B08B5699EB588B22D460ABD37B1FB45B84F484572EE2D43798EF3CE594C340
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: strncmp$atoi$strrchr
                                                                                                                                                                                            • String ID: %s %d$backbytes$byteindex$forwbytes$insert
                                                                                                                                                                                            • API String ID: 834745059-3026567289
                                                                                                                                                                                            • Opcode ID: 2267793edff32a7ff04bd462629248bba15f76abea788871b37ed6690f68402a
                                                                                                                                                                                            • Instruction ID: 2387805c7b0de596cb10ca0d4c2f82a8c98cdf095596bfd34bc93194f1ab7833
                                                                                                                                                                                            • Opcode Fuzzy Hash: 2267793edff32a7ff04bd462629248bba15f76abea788871b37ed6690f68402a
                                                                                                                                                                                            • Instruction Fuzzy Hash: 19E16C2AB09B4286EB18CB66D570ABD77A1FB84F88F1440B5CE2D4B798DF39E451C740
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: strncmp
                                                                                                                                                                                            • String ID: or "$ scan dragto x y ?gain?"$INDEX$LOOKUP$TCL$bad scan option "%s": must be mark or dragto$dragto$mark$mark x y$scan option
                                                                                                                                                                                            • API String ID: 1114863663-3065574316
                                                                                                                                                                                            • Opcode ID: 102db8884eb6536591536fc82e634f6cf15f62fa490398aded43e27ff8a8f4b2
                                                                                                                                                                                            • Instruction ID: 5594c2a0179cc4fbc28e70ccecb9f9394163c9a875d432b70346869235cacaf7
                                                                                                                                                                                            • Opcode Fuzzy Hash: 102db8884eb6536591536fc82e634f6cf15f62fa490398aded43e27ff8a8f4b2
                                                                                                                                                                                            • Instruction Fuzzy Hash: 11A16276B0878286E7248F25E850BAE77A1FB88B84F044172CE6D477A8EF3DE554C710
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: floor
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 3192247854-0
                                                                                                                                                                                            • Opcode ID: 6de550ec5b87b896100f3bf21ecad2b0926b765646a40381e6d95ca916207771
                                                                                                                                                                                            • Instruction ID: 580a5cb4f1fc2bf0101ac4656ace6d7ade6ead29359a0f9f4530d0c1c06652f8
                                                                                                                                                                                            • Opcode Fuzzy Hash: 6de550ec5b87b896100f3bf21ecad2b0926b765646a40381e6d95ca916207771
                                                                                                                                                                                            • Instruction Fuzzy Hash: FA81DA15E18FC988F3175B3540225BDA398AF7B7D5F169372F91A32176EF2825D38100
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: isspace$strncmp
                                                                                                                                                                                            • String ID: $%d %d %d$P5 $P6
                                                                                                                                                                                            • API String ID: 1236840406-2664775524
                                                                                                                                                                                            • Opcode ID: e1b795a0e6626fbf47f0ae73715dbdf036ad1da81d2ebdf440e65e7a021f71a6
                                                                                                                                                                                            • Instruction ID: 53105546e158f912de850ae9ddf87bf419c8f5ecb5af6e40eb53c2c2643f3b86
                                                                                                                                                                                            • Opcode Fuzzy Hash: e1b795a0e6626fbf47f0ae73715dbdf036ad1da81d2ebdf440e65e7a021f71a6
                                                                                                                                                                                            • Instruction Fuzzy Hash: A971AC2AB1CA8686E759CB12E864B7D73A0FB84B44F045075EA6E837D9EF3CE545C700
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: strncmp
                                                                                                                                                                                            • String ID: INDEX$LOOKUP$TCL$bad scan option "%s": must be mark or dragto$dragto$mark$mark|dragto x$scan option
                                                                                                                                                                                            • API String ID: 1114863663-1778636316
                                                                                                                                                                                            • Opcode ID: 8129b89911cf1e014397200d6aad25a4c43d7c66f181e0dee386c3388b073f5e
                                                                                                                                                                                            • Instruction ID: 64635838146ccd7accd658771d9c5b690a093725c4da0c0d1a9299fdcc786e03
                                                                                                                                                                                            • Opcode Fuzzy Hash: 8129b89911cf1e014397200d6aad25a4c43d7c66f181e0dee386c3388b073f5e
                                                                                                                                                                                            • Instruction Fuzzy Hash: 01312969B08A4795F7188F21D860ABC27A0FB45F94F0441B2CD6E477E8EF7DE2158750
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID: ICON$SELF$TRANSIENT$can't make "%s" a master: it is an icon for %s$can't make "%s" a transient: it is an icon for %s$setting "%s" as master creates a transient/master cycle$window ?master?
                                                                                                                                                                                            • API String ID: 0-1237605634
                                                                                                                                                                                            • Opcode ID: e29191a474b38526beeec8100c75b510f493a2557854e9c98de98f3fbb24d123
                                                                                                                                                                                            • Instruction ID: 9929225f944e28b09a05176e9ef6881a7b40ecc364aaa010fff88b35d202fda1
                                                                                                                                                                                            • Opcode Fuzzy Hash: e29191a474b38526beeec8100c75b510f493a2557854e9c98de98f3fbb24d123
                                                                                                                                                                                            • Instruction Fuzzy Hash: 19811F39708B8695EB989F12D964BBD67A0FB44B88F1840B2DE6D0B798DF3CE455C340
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Scan
                                                                                                                                                                                            • String ID: %s event doesn't accept "%s" option$BAD_OPTION$KEYCODE$KEYSYM$LOOKUP$no keycode for keysym "%s"$unknown keysym "%s"
                                                                                                                                                                                            • API String ID: 1686183056-2383413322
                                                                                                                                                                                            • Opcode ID: 236895ea3d81aa803b7027d8d6dbbc76c5cc63cb9c2d4ad8714fcd7a2ca45cdc
                                                                                                                                                                                            • Instruction ID: 88d94e185c70390b3f69dc9c628c274441d95115218cc8f0cf38223920b84b8d
                                                                                                                                                                                            • Opcode Fuzzy Hash: 236895ea3d81aa803b7027d8d6dbbc76c5cc63cb9c2d4ad8714fcd7a2ca45cdc
                                                                                                                                                                                            • Instruction Fuzzy Hash: DB419F69B09A4791EB18CB15E860ABD23E0FB48B84F0440B6DE2E077E8EF7CE551C350
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: BitsClientRectRelease
                                                                                                                                                                                            • String ID: ($XGetGeometry: invalid pixmap$XGetGeometry: invalid window$XGetGeometry: unable to get bitmap size
                                                                                                                                                                                            • API String ID: 3715867303-1062310972
                                                                                                                                                                                            • Opcode ID: 5756827b3ff74ecff2d00d4fbd2d0ad3e606d3116bc3c4f37ce5311235d373d3
                                                                                                                                                                                            • Instruction ID: 656e5f37cb94c819c0999d01f3efae02e7caa5b21d8a9b3e8d8aecb366ecdefc
                                                                                                                                                                                            • Opcode Fuzzy Hash: 5756827b3ff74ecff2d00d4fbd2d0ad3e606d3116bc3c4f37ce5311235d373d3
                                                                                                                                                                                            • Instruction Fuzzy Hash: 1A412B76708A9686EB24CF15E860B6E77B0FB88B84F448572DA9D83798DF3DD454CB00
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_release_startup_lock
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 349153199-0
                                                                                                                                                                                            • Opcode ID: 0556d5dcd40455e3f93672dd4a36095d8c55fd85596292c59b854ef3499913ba
                                                                                                                                                                                            • Instruction ID: c3137460790ad355e6059ae231a06993189a72d30377c82b00f747a0be41141a
                                                                                                                                                                                            • Opcode Fuzzy Hash: 0556d5dcd40455e3f93672dd4a36095d8c55fd85596292c59b854ef3499913ba
                                                                                                                                                                                            • Instruction Fuzzy Hash: 0E81B329F0864346F75C9B6694B1A7D2790AF45B80F5440B5EA2C877DEEF3CED818360
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: _strnicmp$strchr
                                                                                                                                                                                            • String ID: ISOEncode$/%s findfont %d scalefont%s setfont$CANVAS$FONTMAP$Symbol$bad font map entry for "%s": "%s"
                                                                                                                                                                                            • API String ID: 1737111242-3406053624
                                                                                                                                                                                            • Opcode ID: db29e8f8edaacdf31afc2b49bfcbc427a55fc21ddd54826393cd905d9ffec45b
                                                                                                                                                                                            • Instruction ID: 10f0c9c42cec96c13597caded3f9fdfd3c8da711f28bdfe082a3c4e26e76535d
                                                                                                                                                                                            • Opcode Fuzzy Hash: db29e8f8edaacdf31afc2b49bfcbc427a55fc21ddd54826393cd905d9ffec45b
                                                                                                                                                                                            • Instruction Fuzzy Hash: 48919035708B8695EB098B21E864AAA6361FF88FC4F454172DE2E577A8FF7CD155C300
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: memset$strcmp
                                                                                                                                                                                            • String ID: -xpstyle$FILEDIALOG$VALUE$option$value for "%s" missing$value for "-xpstyle" missing
                                                                                                                                                                                            • API String ID: 4285334728-3137637625
                                                                                                                                                                                            • Opcode ID: 93bacfb9a4b02f12bc08e6104fd400874eb28b258cd08379eeecf493c2ee322b
                                                                                                                                                                                            • Instruction ID: a67cb335a0aa91443efd10988bf9bfd72af4de9c8f7bd78995cec39b785f9fd3
                                                                                                                                                                                            • Opcode Fuzzy Hash: 93bacfb9a4b02f12bc08e6104fd400874eb28b258cd08379eeecf493c2ee322b
                                                                                                                                                                                            • Instruction Fuzzy Hash: AF71A179B08B8681EB18CB15E864ABA7761FB88B84F494172DE6D4339CEF7DE154C300
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: strncmp
                                                                                                                                                                                            • String ID: CAP$VALUE$bad cap style "%s": must be butt, projecting, or round$butt$projecting$round
                                                                                                                                                                                            • API String ID: 1114863663-941674569
                                                                                                                                                                                            • Opcode ID: defecadfdb73854c7eef81b4c8cf74f7deb5c73b336e256196a97953462628e4
                                                                                                                                                                                            • Instruction ID: df6602c21541a71e0c77e1dfcfd55b0be8c1d53a5f93df1faadbf2c74ebf1fa4
                                                                                                                                                                                            • Opcode Fuzzy Hash: defecadfdb73854c7eef81b4c8cf74f7deb5c73b336e256196a97953462628e4
                                                                                                                                                                                            • Instruction Fuzzy Hash: 06318D29B08A8291EB048F16E86077D67A0EB45BD8F4442B1EE7C477DCEF6CD182C700
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID: Scrollbar$pathName ?-option value ...?
                                                                                                                                                                                            • API String ID: 0-3433024071
                                                                                                                                                                                            • Opcode ID: 2aa4e154fc4100e3c2475e714edb9737f09c4670d9a06e75d02e094d48318f2a
                                                                                                                                                                                            • Instruction ID: d0841913289bc3122807fe57c4ea0a266e2fb9324f3a997d9d6d3c18ba82c841
                                                                                                                                                                                            • Opcode Fuzzy Hash: 2aa4e154fc4100e3c2475e714edb9737f09c4670d9a06e75d02e094d48318f2a
                                                                                                                                                                                            • Instruction Fuzzy Hash: E8913B36B08B8696E7188B21E964AAD37A4FB48B84F444175DFAD477A9DF3CE074C300
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: memset
                                                                                                                                                                                            • String ID: ;$COLORFUL$GIF$GIF87a$GIF89a$IMAGE$too many colors
                                                                                                                                                                                            • API String ID: 2221118986-2790153539
                                                                                                                                                                                            • Opcode ID: 7995954d83444940841f32d280475849b79df01cec72d6962edeabddae1bbcbe
                                                                                                                                                                                            • Instruction ID: 943330ecb8d10648fbecde61ba005adb05e8f70deef375c6900a2f6765e02921
                                                                                                                                                                                            • Opcode Fuzzy Hash: 7995954d83444940841f32d280475849b79df01cec72d6962edeabddae1bbcbe
                                                                                                                                                                                            • Instruction Fuzzy Hash: 45F1E4367287808AE714CB25E450AAEBBB1F785B88F845165EE8E47B8DDF3DD504CB00
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: HandleLoadModule$ClassCursorIconRegister
                                                                                                                                                                                            • String ID: TkTopLevel$Unable to register TkTopLevel class
                                                                                                                                                                                            • API String ID: 1220223050-2494010311
                                                                                                                                                                                            • Opcode ID: c0923999ed4cc9b7338c188408aeeb62c0a2598192d10c4c95110e9482fa82c4
                                                                                                                                                                                            • Instruction ID: 4ef6ef16740c0c5fd332367052cb6cdfa727f750c8f0c5935ad7196342a6fc0b
                                                                                                                                                                                            • Opcode Fuzzy Hash: c0923999ed4cc9b7338c188408aeeb62c0a2598192d10c4c95110e9482fa82c4
                                                                                                                                                                                            • Instruction Fuzzy Hash: E1517035B08B5282EB198F00E46092D37B4FF84B84F5881B6DA6E43798EF7CE581C700
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: strncmp
                                                                                                                                                                                            • String ID: AMBIGUOUS$API_ABUSE$ARG$UNRECOGNIZED$ambiguous option "%s"$bad argument type %d in Tk_ArgvInfo$unrecognized argument "%s"
                                                                                                                                                                                            • API String ID: 1114863663-1680451580
                                                                                                                                                                                            • Opcode ID: 084b8b1234366c4969611ee7f320351811faf1203b0ed7cf8fbe72e64dc3b0a0
                                                                                                                                                                                            • Instruction ID: d12ec08bf9ad212202f26030670e4beaac34e921f78f14fa98aeb3d2bffa143a
                                                                                                                                                                                            • Opcode Fuzzy Hash: 084b8b1234366c4969611ee7f320351811faf1203b0ed7cf8fbe72e64dc3b0a0
                                                                                                                                                                                            • Instruction Fuzzy Hash: 9E81CF3AB18A8699EB68CF15E860BAE77A0FB44B94F444172CE6E43798DF3CD455C700
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: strncmp
                                                                                                                                                                                            • String ID: ?boolean?$LOOKUP$TOPLEVEL$option$option window ?arg ...?$tracing$window "%s" isn't a top-level window
                                                                                                                                                                                            • API String ID: 1114863663-1970093346
                                                                                                                                                                                            • Opcode ID: 62aa68dd68b8e0244f907e68987766681e9aeca3361ad5f3431ada9919a2293b
                                                                                                                                                                                            • Instruction ID: 817765509c74ef59e1eb89714b64640f96ddc1a1f0a49b12cb71e3329fcf3099
                                                                                                                                                                                            • Opcode Fuzzy Hash: 62aa68dd68b8e0244f907e68987766681e9aeca3361ad5f3431ada9919a2293b
                                                                                                                                                                                            • Instruction Fuzzy Hash: 1A51C63AB08A5792EB588B11EC64ABD33A0FB48B84F448472CE2D97798DF3CE555C340
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: memcpy
                                                                                                                                                                                            • String ID: IMAGE$MALLOC$PNG$TOO_LARGE$image too large to store completely in byte array$memory allocation failed$write to channel failed: %s
                                                                                                                                                                                            • API String ID: 3510742995-3277317274
                                                                                                                                                                                            • Opcode ID: 3f6c6546359e772a6ec459d5d4999bdffbe8cfcba07e71db0c6717b285cde65b
                                                                                                                                                                                            • Instruction ID: 4c19e70d4d515389f425a3da6cd616fc8685eee20e0a348714460b2be4642940
                                                                                                                                                                                            • Opcode Fuzzy Hash: 3f6c6546359e772a6ec459d5d4999bdffbe8cfcba07e71db0c6717b285cde65b
                                                                                                                                                                                            • Instruction Fuzzy Hash: C741743A708A4685EB08CF25E8546BD6361FB88FE4F084172DE2D477A8EE7CD155C700
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID: GC already registered in Tk_GetGC$called GCInit after GCCleanup
                                                                                                                                                                                            • API String ID: 0-2292843906
                                                                                                                                                                                            • Opcode ID: 935f2c972e2b5e75a9649d6fd2438aa905a8e3ac4eb02cb0d8702106db753dfc
                                                                                                                                                                                            • Instruction ID: f2ebd0fe62a2a73681fe1bb56addb8c47a85ec6c9ef77d7e195e863dd6cf6ea6
                                                                                                                                                                                            • Opcode Fuzzy Hash: 935f2c972e2b5e75a9649d6fd2438aa905a8e3ac4eb02cb0d8702106db753dfc
                                                                                                                                                                                            • Instruction Fuzzy Hash: CE026676A04B868AE754CF25E454BAD73A4FB48B88F114176CEAD4B798EF38E490C740
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: CapsDevice$Release
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1035833867-0
                                                                                                                                                                                            • Opcode ID: fc955d50a39548b3510084363987b1d419480ec7525c7fec4981e7bd050a7651
                                                                                                                                                                                            • Instruction ID: de23e50b01c77d612f19d1a9afca97d14d4260d62fd500c7aecdc72e43ee58a9
                                                                                                                                                                                            • Opcode Fuzzy Hash: fc955d50a39548b3510084363987b1d419480ec7525c7fec4981e7bd050a7651
                                                                                                                                                                                            • Instruction Fuzzy Hash: 53212C3AB0865187DB289B6AE46067D73A1FB84B51F40407ADA5F43B98DF3DE445C710
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: strchr
                                                                                                                                                                                            • String ID: orientation$pbar$trough
                                                                                                                                                                                            • API String ID: 2830005266-651220168
                                                                                                                                                                                            • Opcode ID: e62c78c53973d42d5d538ab2c24ffcbaa43e4dc46b082cecb6d8f85357fa9db3
                                                                                                                                                                                            • Instruction ID: b8ce4dc941907234c45af8627f361226c198099d7bb63ad8710cdc225b6e2aa1
                                                                                                                                                                                            • Opcode Fuzzy Hash: e62c78c53973d42d5d538ab2c24ffcbaa43e4dc46b082cecb6d8f85357fa9db3
                                                                                                                                                                                            • Instruction Fuzzy Hash: BD719376A08A859AE7168F34D4506ED73B4FF48788F008372EE0D67A58EF34E696C700
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: strtol
                                                                                                                                                                                            • String ID: LISTBOX_INDEX$VALUE$bad listbox index "%s": must be active, anchor, end, @x,y, or a number
                                                                                                                                                                                            • API String ID: 76114499-2473673577
                                                                                                                                                                                            • Opcode ID: 5307b38f137e6880c4b0a63a64d020ced47e9c8ddd742aa66e93f3cc0800ed74
                                                                                                                                                                                            • Instruction ID: 95ee953cac6e32f7b595aecf5866ad2ecef49470234a7e1babfd343bd78f84cd
                                                                                                                                                                                            • Opcode Fuzzy Hash: 5307b38f137e6880c4b0a63a64d020ced47e9c8ddd742aa66e93f3cc0800ed74
                                                                                                                                                                                            • Instruction Fuzzy Hash: 9A513F76718782D6EB188F25E864AAD77A1FB88B80F448075CB6D47798DF3DE414C710
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: MessageSendTextWindow
                                                                                                                                                                                            • String ID: window ?newTitle?
                                                                                                                                                                                            • API String ID: 893732450-417226443
                                                                                                                                                                                            • Opcode ID: da97f23dc6ecb1b594dc001403435b6db0cbe47546771a0e3350356de93d9f36
                                                                                                                                                                                            • Instruction ID: 45f1ac1c517587b81b76dd50a4383b0ddb8402bf31d8f020dd69ad9e2dd587b4
                                                                                                                                                                                            • Opcode Fuzzy Hash: da97f23dc6ecb1b594dc001403435b6db0cbe47546771a0e3350356de93d9f36
                                                                                                                                                                                            • Instruction Fuzzy Hash: A3517379718A8692EB588B11E860BBD2360FB88F94F044672DE3E077D8DF7CD5558700
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • strtod.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,?,?,?,00007FFDFAC899ED), ref: 00007FFDFAC89CB2
                                                                                                                                                                                            • isspace.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00007FFDFAC899ED), ref: 00007FFDFAC89CD3
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: isspacestrtod
                                                                                                                                                                                            • String ID: DISTANCE$VALUE$bad screen distance "%s"
                                                                                                                                                                                            • API String ID: 858613365-734856420
                                                                                                                                                                                            • Opcode ID: 47b574bd2e45569d71bc221ad6f0f37f0769e146d421e59f9209281690a2787b
                                                                                                                                                                                            • Instruction ID: 8a2972d866d4e2225a9c0696e6f6e6560336a8ef1c35805dbbdd75f59605f8be
                                                                                                                                                                                            • Opcode Fuzzy Hash: 47b574bd2e45569d71bc221ad6f0f37f0769e146d421e59f9209281690a2787b
                                                                                                                                                                                            • Instruction Fuzzy Hash: 3E519F3AB08B8685EB188F15E46067E67A1FB85B95F048172DE6E0B3E8DF7CD485C740
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: strncmp
                                                                                                                                                                                            • String ID: ANCHOR$VALUE$bad anchor position "%s": must be n, ne, e, se, s, sw, w, nw, or center$center
                                                                                                                                                                                            • API String ID: 1114863663-721106602
                                                                                                                                                                                            • Opcode ID: 8a4b7aa398e730576e94f7e79a9aeb929ffe7e71e4cc73c2a58456585924f421
                                                                                                                                                                                            • Instruction ID: d1537766f6faf3b40ae88ca9751bf9b781f303a478cf78d6b4d4773ab3d94e0a
                                                                                                                                                                                            • Opcode Fuzzy Hash: 8a4b7aa398e730576e94f7e79a9aeb929ffe7e71e4cc73c2a58456585924f421
                                                                                                                                                                                            • Instruction Fuzzy Hash: F051C76AF0C58189EB448B19F02076D7BA0E746B98F4841B1EB6C033DDEF6DE4D68B04
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Message$ClientCountPeekScreenTick
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1485206722-0
                                                                                                                                                                                            • Opcode ID: 9cf1e660aeb8ebc11c5fe69aa3c349e291d8524f392d451c24be2d2f945361e7
                                                                                                                                                                                            • Instruction ID: 2198304f0287d660344322315d924f29826bd234104bd00bd8ea3b617f5b0767
                                                                                                                                                                                            • Opcode Fuzzy Hash: 9cf1e660aeb8ebc11c5fe69aa3c349e291d8524f392d451c24be2d2f945361e7
                                                                                                                                                                                            • Instruction Fuzzy Hash: 2841D07AB086818AE7288F3AD494ABD3BB1FB94758F140575DA6957ADCCB3CD440CF40
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Message$ClientCountPeekScreenTick
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1485206722-0
                                                                                                                                                                                            • Opcode ID: 892ce0eabc55b0ee9922b3765cfb78f303d3d6e90635631d5688967917166e04
                                                                                                                                                                                            • Instruction ID: 40496d16c42049070eca11a9f5ac552beaf2bcaa0e76d08409e6db70a28be6ce
                                                                                                                                                                                            • Opcode Fuzzy Hash: 892ce0eabc55b0ee9922b3765cfb78f303d3d6e90635631d5688967917166e04
                                                                                                                                                                                            • Instruction Fuzzy Hash: 6841D07AB086818AE7288F3AD494ABD3BB1FB94758F140575DA6957ADCCB3CD440CF40
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Message$ClientCountPeekScreenTick
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1485206722-0
                                                                                                                                                                                            • Opcode ID: d35147abef83851a6a4556320bf1cc0c7107336135bc396ae9aa8ceb3a577a81
                                                                                                                                                                                            • Instruction ID: 6907d1d98c4c0d0b12d515115e228e3e1c5975f4a8a034bee577024b321000aa
                                                                                                                                                                                            • Opcode Fuzzy Hash: d35147abef83851a6a4556320bf1cc0c7107336135bc396ae9aa8ceb3a577a81
                                                                                                                                                                                            • Instruction Fuzzy Hash: 0341DF7AB082818AE7288F3AD494AAD3BB1FB94758F140575DA6997ADCCB3CD440CF40
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Message$ClientCountPeekScreenTick
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1485206722-0
                                                                                                                                                                                            • Opcode ID: b2e7ff1f4e33fa8dd39f0ab13322df2bb4436798b14882e61600c485713750bf
                                                                                                                                                                                            • Instruction ID: 069afbc0a5774804022222b41164a1a2faf6d078448f7767284f238587559cfd
                                                                                                                                                                                            • Opcode Fuzzy Hash: b2e7ff1f4e33fa8dd39f0ab13322df2bb4436798b14882e61600c485713750bf
                                                                                                                                                                                            • Instruction Fuzzy Hash: E841B07AB082818AE7288F7AD494AAD3BB1FB94758F100565DA6A57ADDCB3CD440CF40
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Message$ClientCountPeekScreenTick
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1485206722-0
                                                                                                                                                                                            • Opcode ID: f29838322a443155fa8809a27345f40a755b7b4d4bc56ba6b74b77099c60aefc
                                                                                                                                                                                            • Instruction ID: a91183f27ac39ebf6e4a30182712d9c65cddfbda0715f157950649313544d535
                                                                                                                                                                                            • Opcode Fuzzy Hash: f29838322a443155fa8809a27345f40a755b7b4d4bc56ba6b74b77099c60aefc
                                                                                                                                                                                            • Instruction Fuzzy Hash: 3A41B07AB082818AE7288F7AD494AAD3BB1FB94758F100565DA6A57ADDCB3CD440CF40
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Message$ClientCountPeekScreenTick
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 1485206722-0
                                                                                                                                                                                            • Opcode ID: 9817f3bbc1a5aee3b865ad762492d38d4facf69947930458dfa100946c6fa7ba
                                                                                                                                                                                            • Instruction ID: 928dfacac2ac8bef1a7dac988b3caba32f7181478b3b6f091cca10fa03e313c2
                                                                                                                                                                                            • Opcode Fuzzy Hash: 9817f3bbc1a5aee3b865ad762492d38d4facf69947930458dfa100946c6fa7ba
                                                                                                                                                                                            • Instruction Fuzzy Hash: 7041B07AB082818AE7288F7AD494AAD3BB1FB94758F100565DA6A57ADDCB3CD440CF40
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID: GC already registered in Tk_GetGC$called GCInit after GCCleanup
                                                                                                                                                                                            • API String ID: 0-2292843906
                                                                                                                                                                                            • Opcode ID: b6e7406765183de341330e7c296b5ea99438e4b21918f3bc084f8400fe3d6f17
                                                                                                                                                                                            • Instruction ID: 9c6aa97b68d205057dd26fa8498239032bda7e8d22d7702ec29e2d81f66f2812
                                                                                                                                                                                            • Opcode Fuzzy Hash: b6e7406765183de341330e7c296b5ea99438e4b21918f3bc084f8400fe3d6f17
                                                                                                                                                                                            • Instruction Fuzzy Hash: CBD157B6B04B818AE754CF65E8907AE77B0F788B88F004125DE9D57B98DF78D5A4CB00
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: DeleteObject
                                                                                                                                                                                            • String ID: GC already registered in Tk_GetGC$called GCInit after GCCleanup
                                                                                                                                                                                            • API String ID: 1531683806-2292843906
                                                                                                                                                                                            • Opcode ID: 79faad88d2c90d6490ecceb2b026e3af16cff72c2884e9cb1f239c91abc18fca
                                                                                                                                                                                            • Instruction ID: 28e3f43cc9ae0840539fdd4cd77e102cd021d846c391a05cafe8e654d8f89cb5
                                                                                                                                                                                            • Opcode Fuzzy Hash: 79faad88d2c90d6490ecceb2b026e3af16cff72c2884e9cb1f239c91abc18fca
                                                                                                                                                                                            • Instruction Fuzzy Hash: 00A147B6704B918AE714CF25E8906AD77B4FB48B88F004126DF5D67BA8DF78D4A5CB00
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Focus$ForegroundWindow
                                                                                                                                                                                            • String ID: ChangeXFocus got null X window
                                                                                                                                                                                            • API String ID: 332191172-2759626269
                                                                                                                                                                                            • Opcode ID: f71b1e17d0a1c7054ca5a51a3d613f9a3fffcf2401f1bd7ddc1e0f69ff52be33
                                                                                                                                                                                            • Instruction ID: b81fc4ce776c0c9298123c740a0fff0b242c0ad0cbbc3ed98ec8b8bd3a1bcea5
                                                                                                                                                                                            • Opcode Fuzzy Hash: f71b1e17d0a1c7054ca5a51a3d613f9a3fffcf2401f1bd7ddc1e0f69ff52be33
                                                                                                                                                                                            • Instruction Fuzzy Hash: 1431FC3AB09A9185EB58CF16E0A066D6370FF84F98F189172DB5E83799DF39D841C700
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: memcpy
                                                                                                                                                                                            • String ID: FILE_TYPE$VALUE$bad file type "%s", should be "typeName {extension ?extensions ...?} ?{macType ?macTypes ...?}?"
                                                                                                                                                                                            • API String ID: 3510742995-1929772856
                                                                                                                                                                                            • Opcode ID: 45edb5b9c8d2b4d457d47cabec614f0eec2f4597e35ace3b7d8a0f5d166ee244
                                                                                                                                                                                            • Instruction ID: 7969ed7c5a9745f655df3e86fe7c7184d98777c44dfd397b183edb7e7b308f8e
                                                                                                                                                                                            • Opcode Fuzzy Hash: 45edb5b9c8d2b4d457d47cabec614f0eec2f4597e35ace3b7d8a0f5d166ee244
                                                                                                                                                                                            • Instruction Fuzzy Hash: 3A51BE7A708B8685EB549F21E8689AE77A1FB45F88F044272DE6D07798EF3DE454C300
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: strncmp
                                                                                                                                                                                            • String ID: -data$-format
                                                                                                                                                                                            • API String ID: 1114863663-1237066767
                                                                                                                                                                                            • Opcode ID: de0f78ac5ea3cd557cd028e8009ea7dfda17c0a2e74d4f5419679121d03c5710
                                                                                                                                                                                            • Instruction ID: a84389ce76f46307499595312e19bbfdbba0b4825479bbdf3073e7780aeadea9
                                                                                                                                                                                            • Opcode Fuzzy Hash: de0f78ac5ea3cd557cd028e8009ea7dfda17c0a2e74d4f5419679121d03c5710
                                                                                                                                                                                            • Instruction Fuzzy Hash: 9C21A469B0864281EB58CB12E864A7E23A0FF85FC4F454472CE2E4B7D9EF3DE5419300
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID:
                                                                                                                                                                                            • String ID: #$FontChanged$TkWorldChanged
                                                                                                                                                                                            • API String ID: 0-419192663
                                                                                                                                                                                            • Opcode ID: 4bfc6feee5c11ff7acdc03a468118de096ba12ebb115d79ae46b833625627aca
                                                                                                                                                                                            • Instruction ID: 74b9aa39767f6a101895c9117c7ee25ff7856803e043e8aee7aaa8ba166e9a51
                                                                                                                                                                                            • Opcode Fuzzy Hash: 4bfc6feee5c11ff7acdc03a468118de096ba12ebb115d79ae46b833625627aca
                                                                                                                                                                                            • Instruction Fuzzy Hash: ED114F36718A8186EB18CB15E4607AE77A1FB88784F084175EA6D07B99DF7CD550CB40
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: Color$ModeText
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 2971265119-0
                                                                                                                                                                                            • Opcode ID: 04873cf4ba52f934b4985ccd6e48f040a7ecb78d9ec8ebda8247ca894588b0d3
                                                                                                                                                                                            • Instruction ID: e53e6e371fa23d141698f9f6e8fb890f274f040de5258fd681acf991674b9911
                                                                                                                                                                                            • Opcode Fuzzy Hash: 04873cf4ba52f934b4985ccd6e48f040a7ecb78d9ec8ebda8247ca894588b0d3
                                                                                                                                                                                            • Instruction Fuzzy Hash: 5F015A76B18A8087DB18CB21F95562EB3A1FB89B90F904034EA8D43B58DF3CD0448F00
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929009473.00007FFDFA971000.00000020.00000001.01000000.00000018.sdmp, Offset: 00007FFDFA970000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2928989710.00007FFDFA970000.00000002.00000001.01000000.00000018.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929130763.00007FFDFAB2D000.00000002.00000001.01000000.00000018.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929130763.00007FFDFAB6B000.00000002.00000001.01000000.00000018.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929130763.00007FFDFAB7B000.00000002.00000001.01000000.00000018.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929130763.00007FFDFAB85000.00000002.00000001.01000000.00000018.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929130763.00007FFDFAB95000.00000002.00000001.01000000.00000018.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929130763.00007FFDFABAA000.00000002.00000001.01000000.00000018.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929276008.00007FFDFABD0000.00000004.00000001.01000000.00000018.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929295848.00007FFDFABD3000.00000008.00000001.01000000.00000018.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929314923.00007FFDFABD8000.00000004.00000001.01000000.00000018.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929334584.00007FFDFABDA000.00000002.00000001.01000000.00000018.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfa970000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 2933794660-0
                                                                                                                                                                                            • Opcode ID: cd7fb2bda6c80a7f9365c257ac8cc4b35861598c5af8624709f61b2c960f1f61
                                                                                                                                                                                            • Instruction ID: 97c587c1a1ebff5cc07f70667c33f150d485800001805a39fda34d9d8b98fcf1
                                                                                                                                                                                            • Opcode Fuzzy Hash: cd7fb2bda6c80a7f9365c257ac8cc4b35861598c5af8624709f61b2c960f1f61
                                                                                                                                                                                            • Instruction Fuzzy Hash: 72115222B14F0589EB00CF60E8646B833A4F759759F441D31DE7E86BA8DF7CD1988380
                                                                                                                                                                                            APIs
                                                                                                                                                                                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,00007FFDFAC47B81), ref: 00007FFDFAC0B2D6
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: strcmp
                                                                                                                                                                                            • String ID: activeBorderWidth$borderWidth$font
                                                                                                                                                                                            • API String ID: 1004003707-486039353
                                                                                                                                                                                            • Opcode ID: 6c9acc58a7e6266b7882974a020f2f6188822f56370788548be1a0c34781450e
                                                                                                                                                                                            • Instruction ID: 52790c61471878768565812c58e18497b1aac1e132f583d9db707b8f20b07767
                                                                                                                                                                                            • Opcode Fuzzy Hash: 6c9acc58a7e6266b7882974a020f2f6188822f56370788548be1a0c34781450e
                                                                                                                                                                                            • Instruction Fuzzy Hash: A9017575B08A5B81EB1D8715E8705B927A1EF48750F4C94B1CE3E473D9EE6CD1918210
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: MetricsSystem
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 4116985748-0
                                                                                                                                                                                            • Opcode ID: acccc09deb629082ec2722570f9b0032ecf433fb0d2a57a790244a5712934561
                                                                                                                                                                                            • Instruction ID: cc282f8c0e2989ea43b0f15781d95ba20f07a9137fd153b40849bd3c745aae36
                                                                                                                                                                                            • Opcode Fuzzy Hash: acccc09deb629082ec2722570f9b0032ecf433fb0d2a57a790244a5712934561
                                                                                                                                                                                            • Instruction Fuzzy Hash: 3D014B5AB08AC5C2F3195B61F8217BE6361FF88B91F401436CF1E02698DF2DA4898310
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: MetricsSystem
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 4116985748-0
                                                                                                                                                                                            • Opcode ID: df17d07466ea6d366295118f6c8d4ad4d820daf045d4f77bc26d640658c4a6fc
                                                                                                                                                                                            • Instruction ID: 244fcb763144dc186b41ea0fbd92333251a763174d01fceb4962245716fc30e3
                                                                                                                                                                                            • Opcode Fuzzy Hash: df17d07466ea6d366295118f6c8d4ad4d820daf045d4f77bc26d640658c4a6fc
                                                                                                                                                                                            • Instruction Fuzzy Hash: 19D04C5CB18546C2F70C1761E835B3C2352FF84B81F541075CB2E027D49E6D68048325
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: MetricsSystem
                                                                                                                                                                                            • String ID:
                                                                                                                                                                                            • API String ID: 4116985748-0
                                                                                                                                                                                            • Opcode ID: b2a45cacb1cd89a4c27a608bdc7177869f45a229aefc133dea1a2c51a32610d5
                                                                                                                                                                                            • Instruction ID: 8e97f938ed6e0f7d97c241e35d94987f0eb3739e825a35348ced79279c04a016
                                                                                                                                                                                            • Opcode Fuzzy Hash: b2a45cacb1cd89a4c27a608bdc7177869f45a229aefc133dea1a2c51a32610d5
                                                                                                                                                                                            • Instruction Fuzzy Hash: A6D0B758718586D2F34C1761A435B3C2251EF44A41F401075C72F016D48E5D28044235
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: DeleteObject
                                                                                                                                                                                            • String ID: GC already registered in Tk_GetGC$called GCInit after GCCleanup
                                                                                                                                                                                            • API String ID: 1531683806-2292843906
                                                                                                                                                                                            • Opcode ID: bad01ac974cd94f9594271fa33447896717281b4ac9a4c7bf4cdeb3e54cad7a0
                                                                                                                                                                                            • Instruction ID: 04005ba3c6db55809f340424c7251dea2892819e4e5148b188c3c251b44f5000
                                                                                                                                                                                            • Opcode Fuzzy Hash: bad01ac974cd94f9594271fa33447896717281b4ac9a4c7bf4cdeb3e54cad7a0
                                                                                                                                                                                            • Instruction Fuzzy Hash: DA027B7A704B828AE768CF15E490BAD77A0FB84B88F114176DE6D47798EF79E440CB40
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: CreateMessage$BitmapDeleteErrorFormatFreeLastLocalObjectReleaseSection
                                                                                                                                                                                            • String ID: GC already registered in Tk_GetGC$called GCInit after GCCleanup
                                                                                                                                                                                            • API String ID: 1892380217-2292843906
                                                                                                                                                                                            • Opcode ID: cb20e168b1409f0ac251ca6e2f1408c1b57af4516644bd3e78949cd1fb15d37b
                                                                                                                                                                                            • Instruction ID: 41e2e9580bbe9e29e74e935fde667c88eed9d737d3dbf417872ad62a1dd19543
                                                                                                                                                                                            • Opcode Fuzzy Hash: cb20e168b1409f0ac251ca6e2f1408c1b57af4516644bd3e78949cd1fb15d37b
                                                                                                                                                                                            • Instruction Fuzzy Hash: 1FE157B6704B918AE718CF25E4A0AAD37B5F748B88F01413ADE5D5BB98DF38E460C750
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: DeleteObject
                                                                                                                                                                                            • String ID: GC already registered in Tk_GetGC$called GCInit after GCCleanup
                                                                                                                                                                                            • API String ID: 1531683806-2292843906
                                                                                                                                                                                            • Opcode ID: 25418eccd544944cad1c0204ab4900cea61e7bad28ab227d25fd0accf1c53b07
                                                                                                                                                                                            • Instruction ID: 13eb0e07de8af78f6825e33cf266c45e090e0f1dba46e0af0299289dcf14b5b1
                                                                                                                                                                                            • Opcode Fuzzy Hash: 25418eccd544944cad1c0204ab4900cea61e7bad28ab227d25fd0accf1c53b07
                                                                                                                                                                                            • Instruction Fuzzy Hash: A7C19CB6B04B818AE704CF65E4506AE77B1FB88B88F004126DE5D57B98EF78D5A4CB40
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: isupperstrncpy
                                                                                                                                                                                            • String ID: Menu
                                                                                                                                                                                            • API String ID: 3785496964-3711407533
                                                                                                                                                                                            • Opcode ID: 5ad39b4f0e17036b216307a3963c01da0e41fdea62c303651fa93f52b6a972d6
                                                                                                                                                                                            • Instruction ID: 2cdf18abb277ee79eb73f0c9b3a54cdc1eb540a86574149c2eab903f9c481980
                                                                                                                                                                                            • Opcode Fuzzy Hash: 5ad39b4f0e17036b216307a3963c01da0e41fdea62c303651fa93f52b6a972d6
                                                                                                                                                                                            • Instruction Fuzzy Hash: F1B1E03AA08B86CAE7548F15E4A0BBD3BA0FB84B88F458076DB9D07799DF78D545C300
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: DeleteObject
                                                                                                                                                                                            • String ID: GC already registered in Tk_GetGC$called GCInit after GCCleanup
                                                                                                                                                                                            • API String ID: 1531683806-2292843906
                                                                                                                                                                                            • Opcode ID: af1e07c75e037818258f094afabb4585464212d95d15054f7554bd8418cfab04
                                                                                                                                                                                            • Instruction ID: a202a6c3977e18611e87cd9d5fdaf50d661badabb080905a463b0ff0bdacfa94
                                                                                                                                                                                            • Opcode Fuzzy Hash: af1e07c75e037818258f094afabb4585464212d95d15054f7554bd8418cfab04
                                                                                                                                                                                            • Instruction Fuzzy Hash: 4FB16BBA604B8186E754CF55E8947AEB7B4FB88B94F004126DF9D43B98DF78D494CB00
                                                                                                                                                                                            APIs
                                                                                                                                                                                            Strings
                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                            • Source File: 00000001.00000002.2929377392.00007FFDFABF1000.00000020.00000001.01000000.00000017.sdmp, Offset: 00007FFDFABF0000, based on PE: true
                                                                                                                                                                                            • Associated: 00000001.00000002.2929357864.00007FFDFABF0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929451586.00007FFDFACF1000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929485387.00007FFDFAD38000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929506388.00007FFDFAD39000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929526457.00007FFDFAD3D000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929544542.00007FFDFAD3E000.00000008.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929562320.00007FFDFAD40000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            • Associated: 00000001.00000002.2929582370.00007FFDFAD42000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                            • Snapshot File: hcaresult_1_2_7ffdfabf0000_Chione.jbxd
                                                                                                                                                                                            Similarity
                                                                                                                                                                                            • API ID: DeleteObject
                                                                                                                                                                                            • String ID: GC already registered in Tk_GetGC$called GCInit after GCCleanup
                                                                                                                                                                                            • API String ID: 1531683806-2292843906
                                                                                                                                                                                            • Opcode ID: a89923872b26550d7a644b3007ae4c2597de9c76976f00854c057bb3b813fd88
                                                                                                                                                                                            • Instruction ID: 6dc46189784ef88b2f5736db9abb93138208040b8b45cbcd908648c2936d8032
                                                                                                                                                                                            • Opcode Fuzzy Hash: a89923872b26550d7a644b3007ae4c2597de9c76976f00854c057bb3b813fd88
                                                                                                                                                                                            • Instruction Fuzzy Hash: 82B155B6604B818AE754CF24E8947AD33B5F708B58F00463ADEAD4BB98DF78D4A4C750